scispace - formally typeset
Search or ask a question

Showing papers in "International Journal of Interdisciplinary Telecommunications and Networking in 2010"


Journal ArticleDOI
TL;DR: Performance comparison studies involving well-known LEACH and PEGASIS algorithms indicate that ECDS-DG incurs the lowest energy consumption per round and sustains the largest number of rounds before first node failure.
Abstract: This paper develops an energy-aware connected dominating set based data gathering ECDS-DG algorithm for wireless sensor networks. The algorithm includes only nodes that have a relatively higher energy level in ECDS. For every round, a data gathering tree ECDS-DG tree rooted at the ECDS Leader, that is, the node with the largest available energy, which transmits the data packet to the sink, is formed by considering only the nodes in the ECDS as the intermediate nodes of the tree. The non-ECDS nodes are leaf nodes of the tree, and the upstream node of an intermediate ECDS node in the ECDS-DG tree is the closest ECDS node that is also relatively closer to the ECDS Leader. Performance comparison studies involving well-known LEACH and PEGASIS algorithms indicate that ECDS-DG incurs the lowest energy consumption per round and sustains the largest number of rounds before first node failure.

31 citations


Journal ArticleDOI
TL;DR: The authors designed and implemented a new class of general purpose database management systems, the live video database management system LVDBMS, which views networked video cameras as a special class of interconnected storage devices, and allows the user to formulate ad hoc queries expressed over real-time live video feeds.
Abstract: With the proliferation of inexpensive cameras and the availability of high-speed wired and wireless networks, systems of distributed cameras are becoming an enabling technology for a broad range of interdisciplinary applications in domains such as public safety and security, manufacturing, transportation, and healthcare. Today's live video processing systems on networks of distributed cameras, however, are designed for specific classes of applications. To provide a generic query processing platform for applications of distributed camera networks, the authors designed and implemented a new class of general purpose database management systems, the live video database management system LVDBMS. The authors view networked video cameras as a special class of interconnected storage devices, and allow the user to formulate ad hoc queries expressed over real-time live video feeds. This paper introduces their system and presents the live video data model, the query language, and the query processing and optimization technique.

21 citations


Journal ArticleDOI
TL;DR: This paper compares the portfolios with respect to their market attractiveness and competitive positions in 2008 relative to 2002 on both an overall average and degree of variance basis across the markets in the portfolios.
Abstract: In response to slowing growth, intensifying competition in their traditional wireless voice, text markets with an eye toward increasing revenues from offering a bundle of mobile and fixed-line voice, data, text, and video services to subscribers, management at Telefonica and America Movil have restructured their companies and reconsidered their internationalization strategies. This paper focuses on the two companies' Latin American wireless market portfolios, providing background on why these reorganizational and strategic actions were taken. In particular, the paper compares the portfolios with respect to their market attractiveness and competitive positions in 2008 relative to 2002 on both an overall average and degree of variance basis across the markets in the portfolios. The portfolio analysis technique employed in the paper may have wider applicability for formulating corporate strategy.

15 citations


Journal ArticleDOI
Abstract: In recently proposed multiple access techniques like IDMA and OFDM-IDMA, the user separation is done by user specific interleavers in contrast to the conventional CDMA scheme, where user separation is assured with user-specific signature sequences. The user specific interleavers must demonstrate minimum probability of collision amongst each other in addition to other merits, including minimal consumption of bandwidth, least hardware for their generation, and least memory requirement. In this paper, the authors propose an interleaver based on prime numbers for the generation of user specific interleavers to remove the problem of high consumption of bandwidth. The simulation results demonstrate the optimal performance of prime interleaver PI, which is based on prime numbers, apart from other merits in comparison to random and other interleavers.

13 citations


Journal ArticleDOI
TL;DR: The results show that this network analyzer development for heterogeneous services in a campus environment is accurate with independent data, real networks and OPNET simulation tools.
Abstract: This paper presents complete network analyzer development for heterogeneous services in a campus environment. The purpose of this study is to define the accuracy of network analyzer development with independent data, real networks and OPNET simulation tools. The tests for network analyzer software are based on traffic and utilization performance. The reliability of this network analyzer will test with web service. The results show that this software is accurate with independent data, real networks and OPNET simulation tools. Finally, this software measures network resources during the preparation, proposal and planning phases.

11 citations


Journal ArticleDOI
TL;DR: Simulation results demonstrate that MIF incurs a significant reduction in the end-to-end delay per data packet vis-i-vis the interference-aware load balancing routing protocol.
Abstract: The authors propose a beaconless, on-demand, mobile ad hoc network routing protocol called minimum interference based routing protocol MIF that minimizes the end-to-end delay per data packet. During route discovery, each node inserts its identification and location information before broadcasting the Route-Request RREQ message in its neighborhood. The weight of a link, called the interference index, is the number of interfering links surrounding it. Two links are said to interfere with each other, if the distance between the mid points of the two links is within the interference range. The interference index of a path is the sum of the interference index values of the constituent links. The destination selects the path with the minimum interference index value and notifies the source through the Route-Reply packet. Simulation results demonstrate that MIF incurs a significant reduction in the end-to-end delay per data packet vis-i-vis the interference-aware load balancing routing protocol.

11 citations


Journal ArticleDOI
TL;DR: In this article, the authors focus on the deployment and testing of various Open Source Asterisk Services in an enterprise level communication system, which can be used to implement a telephone system with good quality of services QoS and good Quality of Experience QoE from the personal user to enterprise level users.
Abstract: Asterisk is a leading open source telephony software/system, easily implemented over intranet and internet. Asterisk empowers developers and integrators to create advanced communication solutions. An Asterisk system is a low cost type of a traditional PBX system. Any phone controlled by an Asterisk system can call a VoIP or analog phone controlled or managed by a traditional telephone system or by Asterisk telephone system. In this paper, the authors focus on the deployment and testing of various Open Source Asterisk Services in an enterprise level communication system. Selected services are listed in this paper that can be used to implement a telephone system with good Quality of Services QoS and good Quality of Experience QoE from the personal user to enterprise level users.

11 citations


Journal ArticleDOI
TL;DR: The re-homing of radio network controller RNC and base station controller BSC is introduced and the impact on the performance of voice core of UMTS networks.
Abstract: The past few years have seen mobile operators transition to next-generation mobile networks, specifically from third-generation networks 3G to long term evolution LTE. This paper describes the basic architecture and topology of UMTS R4 core network and introduces two options in network planning, i.e., flat structure or layered structure. This paper introduces the re-homing of radio network controller RNC and base station controller BSC and studies the impact on the performance of voice core of UMTS networks. The proposed RNC re-homing models are created and analyzed for voice core of UMTS networks. The paper concludes that the appropriate RNC re-homing optimizes the traffic of voice core in UMTS network.

11 citations


Journal ArticleDOI
TL;DR: The author presents the landscape of the mobile telecommunications tower industry in India, which consists of four types of companies and trends with respect to the strategies of telecommunication tower companies, especially tenancy ratio.
Abstract: With the entry of 3G and WiMAX players, the Indian mobile subscriber base is expected to reach 1110 million by the end of 2015. To meet mobile infrastructure demand, India will require approximately 350,000 to 400,000 mobile telecommunications towers in the next 7 to 8 years. Presently only 40% of mobile telecommunications towers are shared in India. The high growth of subscribers and initial cost of mobile telecommunications towers and license conditions will force mobile network operators to share infrastructure with other mobile network operators, specifically with new operators. The Indian government has allowed sharing of passive and active components of mobile telecommunication infrastructure. With the changing demand of the telecommunications infrastructure, many new telecommunications tower business entities and companies and mobile telecommunications tower business models are being explored. In this paper, the author presents the landscape of the mobile telecommunications tower industry in India, which consists of four types of companies and trends with respect to the strategies of telecommunication tower companies, especially tenancy ratio. Emerging features of the mobile telecommunication towers industry in India are also presented.

10 citations


Journal ArticleDOI
TL;DR: The algorithms to dimension the throughput for packet switched domain of a UMTS network are introduced and an optimum network size and network structure is provided to deliver an optimum quality of service for users.
Abstract: Mobile packet services are penetrating mobile markets rapidly. The mobile industry relies heavily on data services to replace traditional voice services. Designing a reliable packet service network is critical to the mobile operators' ability to maintain their core competence in a data service market. The current literature provides many practical tools and theoretical methods to design, plan and dimension Global System for Mobile Communications GSM and Universal Mobile Telecommunications System UMTS radio networks but overlooks the algorithms of network plan and dimensioning for the core networks. This paper introduces the algorithms to dimension the throughput for packet switched domain of a UMTS network. The analysis is based on the traffic and data throughput generated and absorbed in the interfaces of network entities in UMTS PS network. A case study is provided to verify the algorithms created for UMTS PS network. This paper provides UMTS PS network operators an optimum network size and network structure to deliver an optimum quality of service for users.

10 citations


Journal ArticleDOI
TL;DR: This paper explores some of the possibilities of utilizing one particular virtual world Second Life as a platform for network and information security training with a focus on the profiling of online behavior.
Abstract: Virtual worlds have become increasingly popular with the growth of high speed Internet access worldwide and online gaming. The popularity of massively multiplayer online role playing games MMORPG, such as World of Warcraft, and virtual worlds, such as Second Life, has created an opportunity for educators to build a learning platform that students can readily relate to. This paper explores some of the possibilities of utilizing one particular virtual world Second Life as a platform for network and information security training with a focus on the profiling of online behavior. In particular it describes the initial attempts of its use at one of the Pennsylvania State University's campuses.

Journal ArticleDOI
TL;DR: In this paper, the preliminary and advanced knowledge of wireless networks affect users' perception and usage, and regression analyses reveal that wireless network usage is affected less by advanced wireless network knowledge and more by preliminary knowledge.
Abstract: Wireless networks provide the most convenient way to access the Internet. This paper determines how the preliminary and advanced knowledge of wireless networks affect users' perception and usage. Based on their knowledge, users develop certain emotional responses, which could affect their wireless network usage. This study identifies the effect of these emotional responses on users' degree of use of wireless networks. Using data collected from 143 respondents, regression analyses reveal that wireless network usage is affected less by advanced wireless network knowledge and more by preliminary knowledge. The findings also show that the degree of usage depends on users' ability to understand basic wireless network functionality and security. To motivate wireless usage, developers and designers of future wireless technologies do not need to overwhelm users with technical detail.

Journal ArticleDOI
TL;DR: The authors' proposed approach seeks to reduce overall latency for multicast streams, especially with respect to multicasting, in order to reduce latency in the delivery of online content.
Abstract: Multimedia traffic on the Internet has grown dramatically in the past few years. Web sites, such as YouTube and Hulu, offer entertainment and educational multimedia content that previously was only available through broadcast or cable television and on storage media, such as CD-ROMs and videotapes. Latency is a key issue in the delivery of online content, especially with respect to multicasting. The authors' proposed approach seeks to reduce overall latency for multicast streams.

Journal ArticleDOI
TL;DR: The results show that the adaptive clustering with different partitioning methods provide better capacity and grade of service GoS comparing to the conventional cellular architectures.
Abstract: In this paper, the authors propose three partitioning schemes for adaptive clustering with fractional frequency reuse namely maximal fractional frequency reuse partitioning MFRP, optimal fractional reuse partitioning OFRP, and GoS-oriented frequency reuse partitioning. The authors propose that an overlaid cellular clustering scheme, which uses adaptive fractional frequency reuse factors, would provide a better capacity by exploiting the high level of signal to interference ratio SIR. The proposed methods are studied via simulations and the results show that the adaptive clustering with different partitioning methods provide better capacity and grade of service GoS comparing to the conventional cellular architectures.

Journal ArticleDOI
TL;DR: This paper presents a novel recommendation system using the multi-agent technology, based on multi-criteria ratings, which aggregates into an overall service ranking list by a rank aggregation algorithm.
Abstract: With the rapid advancement of wireless technologies and mobile devices, mobile services offer great convenience and huge opportunities for service creation. However, information overload make service recommendation become a crucial issue in mobile services. Although traditional single-criteria recommendation systems have been successful in a number of personalization applications, obviously individual criterion cannot satisfy consumers' demands. Relying on multi-criteria ratings, this paper presents a novel recommendation system using the multi-agent technology. In this system, the ratings with respect to the three criteria are aggregated into an overall service ranking list by a rank aggregation algorithm. Furthermore, all of the services are classified into several clusters to reduce information overload further. Finally, Based on multi-criteria rank aggregation, the prototype of a recommendation system is implemented. Successful applications of this recommendation system have demonstrated the efficiency of the proposed approach.

Journal ArticleDOI
TL;DR: A theory that empirically examines why mobile wireless carriers share the costs of building networks and provisioning wireless services is provided, based on extensive studies of network sharing adopted by network operators and service providers across the world during the past decade.
Abstract: This paper provides a theory that empirically examines why mobile wireless carriers share the costs of building networks and provisioning wireless services. Of the cost drivers of network operators, the most influential on the industry's dynamics are capital investments, which include network infrastructure investments. As the industry evolves, players strive to streamline their services, applications, revenue, and business models to revive this industry. In this regard, one model in particular is the network operators', which shares network investments and service provisioning expenses to reduce their total expenditures while strengthening their financial liquidity. In this paper, the authors integrate research results to provide a new theory on network sharing with concepts and viewpoints that have been developed based on extensive studies of network sharing adopted by network operators and service providers across the world during the past decade.

Journal ArticleDOI
TL;DR: The author found that, although monopoly network operators have no incentive to deviate from neutrality, the duopoly network operators has this incentive, hence the total surplus in both market structures.
Abstract: This paper investigates how incentives of network operators to deviate from neutrality may create social costs or benefits in different market structures. The deviation from network neutrality is a general form of discrimination based on charging different prices for non-affiliated content and application providers. In this paper, deviation from network neutrality is formulated as a form of vertical foreclosure. While constructing the model two-sided nature of the internet service, the providing market is considered. The author found that, although monopoly network operators have no incentive to deviate from neutrality, the duopoly network operators have this incentive. Welfare analysis suggests destructive results for almost all participants, hence the total surplus in both market structures. In addition, the analysis for the degree of integration between the network operators and their affiliated content and application providers, suggest some policy proposals to discourage their degree of integration.