In this paper, we analyze the common packet channel (CPCH) mechanism for finite population, finite sojourn time and general packet length distribution. The obtained results demonstrate that for packet length distribut...
详细信息
ISBN:
(纸本)0780374002
In this paper, we analyze the common packet channel (CPCH) mechanism for finite population, finite sojourn time and general packet length distribution. The obtained results demonstrate that for packet length distributions with the same mean but different tail properties the system behavior can change dramatically. In addition, we demonstrate that this study provides an analytical tool that can be used as the underlying framework for the support of a wide range of applications and management functions such as optimization of design parameters, integration of multimedia services and anomaly detection in CDMA wireless networks.
This paper investigates a home entertainment network proposal that applies the advantages of ultra wideband (UWB) radio technology and the IEEE 1394 system. We first introduce an overview of the IEEE 1394 standard. Th...
详细信息
This paper investigates a home entertainment network proposal that applies the advantages of ultra wideband (UWB) radio technology and the IEEE 1394 system. We first introduce an overview of the IEEE 1394 standard. Then we describe the network architecture of our proposed home networking scheme, namely IEEE 1394-based UWB home entertainment network connected by a wireless 1394 bridge. The IEEE 1394 backbone network and UWB radio subsystem are discussed in detail. Summaries are provided as well.
In the next-generation wireless network, user profiles such as the location, the velocity (both speed and direction), and the resource requirements of the mobile device can be accurately determined and maintained by t...
详细信息
In the next-generation wireless network, user profiles such as the location, the velocity (both speed and direction), and the resource requirements of the mobile device can be accurately determined and maintained by the network on a per-user basis. We investigate the design of a Differentiated-Services architecture which exploits user profiles to maximize the network efficiency and which supports differentiated services classes, each with different quality-of-service (QoS) guarantees. In this paper, we provide implementation details of such an architecture for the Third-Generation Partnership Project (3GPP) network. The key underlying primitive of the architecture is the use of user profiles to perform advance resource reservation in target cells of the wireless cellular network. We identify the design tradeoffs and present performance results for an architecture consisting of two service classes, namely (1) a higher-cost profiled service with higher QoS, and (2) a lower-cost non-profiled service with best-effort QoS. Our analysis indicates that a significant decrease in the dropping probability - and, hence, higher QoS - can be guaranteed to users who subscribe to the profiled service. We examine the tradeoffs associated with some of the key system parameters including the reservation distance and the reservation granularity, and we determine their values which maximize the improvement in the dropping probability for all users.
In this paper we propose a mechanism of an adaptive multimedia stream service that can support continuous data transmissions in mobile computing environment. This mechanism contains an effective buffeting method, an i...
详细信息
ISBN:
(纸本)0769509517;0769509525
In this paper we propose a mechanism of an adaptive multimedia stream service that can support continuous data transmissions in mobile computing environment. This mechanism contains an effective buffeting method, an intelligent filtering and QoS negotiation method, and a playout control method to provide seamless playback of multimedia streams. To implement the mechanisms in the mobile computing environment, we take the concept of proxy It is located in the intermediate place between Two communication endpoints and it plays the role of an agent of the mobile hosts. The proxy uses the buffering method to keep constant transmission rates using feedback so that it can provide an adaptive stream service to the network. If needed, the proxy may transform the streams by applying filters to make mobile hosts' environments more optimal. And it does QoS negotiation with mobile hosts if the network bandwidth cannot support required QoS or if the environment of mobile host was changed.
In distributed applications like teleconferences, a group of multiple processes are cooperating, where messages exchanged among the processes are required to be causally delivered. The processes are exchanging kinds o...
详细信息
ISBN:
(纸本)0769509517;0769509525
In distributed applications like teleconferences, a group of multiple processes are cooperating, where messages exchanged among the processes are required to be causally delivered. The processes are exchanging kinds of multimedia objects in addition to traditional test data. The multimedia objects are longer than traditional messages and are structured. In this paper, we discuss new types of causally precedent relations among multimedia objects transmitted in the network. We discuss a protocol to causally deliver multimedia objects in a group of processes. We also show the evaluation of the protocol.
In this paper, we present the functions of the general multimedia session. We consider the mapping of the fundamental functions for the multimedia session of ITU-T H.323 Recommendation and SIP(Session Initiation Proto...
详细信息
ISBN:
(纸本)0769509525
In this paper, we present the functions of the general multimedia session. We consider the mapping of the fundamental functions for the multimedia session of ITU-T H.323 Recommendation and SIP(Session Initiation Protocol), which are the major signalling protocols of the multimedia session. We also consider the behavior of specific functions of each protocol, and design the Gateway which provides the interconnection between these protocols. And then we discuss the applied operation of the Gateway in the multipoint conference using these two protocols.
Visions and expected predictions of future networking paradigms often include heterogeneous networks build upon an IP-based core. Future services form a key component within these networks and are expected to include ...
详细信息
ISBN:
(纸本)0792373650
Visions and expected predictions of future networking paradigms often include heterogeneous networks build upon an IP-based core. Future services form a key component within these networks and are expected to include support for nomadic and ubiquitous usage. This paper comprises a discussion of nomadic usage scenarios within service centered networks. Thereafter secure service discovery under nomadic conditions is explained by means of a model introduced in this contribution. This model embraces the nature of nomadic computing as macro-nomadic vs. micro-nomadic depending on the use case. As a conclusion unresolved problems concerning service security within the given boundaries will be presented.
Live Internet streaming media programs, called webcasts, can adopt techniques developed by television to obtain higher quality. We have developed a general webcast production model composed of three stages (i.e., sour...
详细信息
ISBN:
(纸本)0819439908
Live Internet streaming media programs, called webcasts, can adopt techniques developed by television to obtain higher quality. We have developed a general webcast production model composed of three stages (i.e., sources, broadcast, and transmission) and a tool, called the Director's Console (dc), to control live webcasts. The tool is one component of a distributed service architecture, which adapts to varying physical infrastructures and broadcast configurations.
The main concern of this research(1) is to design an adaptive bus model supporting distributed multimediacomputing effectively in wireless or mobile networks. Key features of the model are as follows: First, the bus ...
详细信息
ISBN:
(纸本)0769509517;0769509525
The main concern of this research(1) is to design an adaptive bus model supporting distributed multimediacomputing effectively in wireless or mobile networks. Key features of the model are as follows: First, the bus model has an ability to control the binding at various levels explicitly. In addition to typical explicit binding characteristics, it has made possible more flexible bus configuration from the application level to the transport level by hierarchical explicit binding control and controllable visibility of explicitness for security and integrity of computing. It enables the bus to adapt more flexibly in response to fluctuation of environments. Second, the bus model has two-layer meta-object protocols(MOP), which are component layer MOP and binding layer MOP, for implementation of adaptation. The component MOP plays roles of inspecting and manipulating each component in the function and resource aspect. And the binding MOP plays roles of inspecting and manipulating each binding in the topology, access and flow aspect. Its architecture makes possible adaptations in integrity. Third, the bus model makes adaptations based on profiles, which is some collected information from the user, host and networks. The Profile-based adaptation has made possible self-adaptation to some degree at each level and some prediction on usage pattern or resources.
To achieve a fault-tolerant distributed systems, checkpoint-recovery has been researched and many protocols have been designed. A global checkpoint taken by the protocols have to be consistent. For conventional data c...
详细信息
ISBN:
(纸本)0769509525
To achieve a fault-tolerant distributed systems, checkpoint-recovery has been researched and many protocols have been designed. A global checkpoint taken by the protocols have to be consistent. For conventional data communication network, a global checkpoint is defined consistent if there is neither orphan nor lost message. For a multimedia communication network, there are different requirements such as large-size massages, lime-constrained failure free execution and allowance of certain amount of lost packers. This paper proposes a new criteria of consistent global checkpoints for supporting multimedia communication network. in addition, a checkpoint protocol with QoS based consistency is designed and applied to MPEG-2 data transmission.
暂无评论