WINSYS 2007 Abstracts
CONFERENCE
Area 1 - Wireless Information Networks
Area 2 - Wireless Networking Technologies
Area 3 - Mobile Software and Services
Area 4 - Wireless Information Policy, Risk Assessment and Management
Title:
TAG NUMBER ESTIMATION SCHEME IN GEN2 PROTOCOL BASED RFID SYSTEM
Author(s):
Cheng-Hao Quan, Hee-Sook Mo and Gil-Young Choi
Abstract:
Recently, the RFID(Radio Frequency Identification) technology has gained significant attention. One of the performance issues in RFID systems is to resolve the tag collision among responses from RFID tags. In this paper, we proposed a Gen2 Protocol based Tag Number Estimation Scheme for estimation of the number of tags in the reader filed. The scheme is used by anti-collision algorithm to identify multiple tags efficiently. We also present the simulation result that shows the proposed scheme to estimate tags efficiently and also to improve the systems efficiency.

Title:
DESIGN OF A PASSWORD-BASED AUTHENTICATION METHOD FOR WIRELESS NETWORKS
Author(s):
Andrea Manganaro, Mingyur Koblensky and Michele Loreti
Abstract:
In recent years, amendments to IEEE standards for wireless networks added support for authentication algorithms based on the Extensible Authentication Protocol (EAP). Available solutions generally use digital certificates or pre-shared keys but the management of the resulting implementations is complex or unlikely to be scalable. In this paper we present EAP-SRP-256, an authentication method proposal that relies on the SRP-6 protocol and provides a strong password-based authentication mechanism. It is intended to meet the IETF security and key management requirements for wireless networks.

Title:
OPTIMAL ENERGY ALLOCATION FOR DETECTION IN WIRELESS SENSOR NETWORKS
Author(s):
Krishna Gunturu and Mort Naraghi-Pour
Abstract:
The problem of binary hypothesis testing in a wireless sensor network is studies in the presence of noisy channels and for non-identical sensors. We have devised an energy allocation scheme for individual sensors in order to optimize a cost function with a constraint on the total network energy. Two cost functions were considered; the probability of error and the J-divergence distance measure. We have also designed a mathematically tractable fusion rule for which optimal energy allocation can be achieved. Results of optimal energy allocation and the resulting probability of error are presented for different sensor network configurations.

Title:
VESMP (VERY SHORT MESSAGE PROTOCOL) AN SMS-BASED PROTOCOL FOR PROCESS MONITORING AND SYSTEM REMOTE ADMINISTRATION
Author(s):
Thomas Ndie Djotio, Claude Tangha and Georges Edouard Kouamou
Abstract:
In this paper we propose a Very Short Message protocol (VeSMp), a simple SMS-based protocol for process monitoring and system remote administration. This protocol offers the system administrator an additional means of supervising and monitoring the activity or the state of processes and services via a mobile terminal. VeSMp transforms a Global Mobile Standard (GSM) terminal by means of SMS service into a true station of system administration as well as a PC connected to a corporate network. This protocol uses an original concept which we call VeSM (for Very Short Message). VeSM represents a very short message, an alias or extensible shortcut which makes it possible to implicitly exceed the conventional limit of 160 characters maximum used in SMS.

Title:
EFFICIENT PLACEMENT OF WIRELESS BASE-STATIONS IN URBAN ENVIRONMENT
Author(s):
Mansour A. Aldajani
Abstract:
This work proposes a novel approach for placing wireless base-stations in urban environments. The new approach solves the placement problem using 2-D convolution. Convolution searches for the best locations of base stations based on highest consumption criteria. Convolution theorem is then used to substantially cut the
computation load of the proposed approach. The approach allows simple user-interface and arbitrary demand and supply patterns of power. Simulations show that the new approach can be used to efficiently model and place wireless base-stations.

Title:
WIRELESS TEMPERATURE SENSOR NETWORK Wireless Sensor Data Transfer as Well as Processing
Author(s):
Miroslav Husak, Petr Oberreiter and Julius Foit
Abstract:
The realized system for wireless measurement of temperature in the many different places is described. The paper describes a new architecture of a multisensor system for remote temperature measurement using wireless communications. The system is composed of temperature sensors with digital output. The system ensures RF wireless data transfer, wireless communication between control unit and sensors as well as wireless switch unit. The integrated RF chip nRF9E5 ensures wireless communication. The control unit controls communications, sensor data processing as well as switching of actuator unit. The control unit contains main control microprocessor ATMEL as well as wireless communication unit. The actuator switch unit communicates with control unit using RF wireless way. Partial control programmes were designed for wireless unit control. There are many program functions implemented. The control software of the whole system has been designed. The designed system, i.e. hardware and software has been realized and tested. The system can operated in the range of 300 m in the free space. The number of sensor can be extensible. The system can be use to operate with different type of sensor, i.e. for measurement other type of quantities. PDA or mobile phone can be used to communication with control unit.

Title:
TRANSMISSION POWER CONTROL FOR AVOIDING CELL OVERLAPPING IN MICRO-CELLULAR NETWORKS
Author(s):
Akiko Miyagawa, Masahiro Sasabe, Hirotaka Nakano
Abstract:
In a cellular system, a base station can smoothly communicate with nodes in its cell by avoiding overlap of frequency range with its adjacent cells. From the viewpoint of graph theory, that needs to divide the original frequency range into at least four sub-ranges. This leads to deteriorate the transmission rate. To tackle this problem, we propose Complete Cell Partitioning (CCP) that enables a base station to use the whole of the original frequency range by avoiding overlap of its own cell with the adjacent cells. CCP is achieved by appropriately controlling the transmission power on base stations. We first analytically derive success probability of CCP when nodes are randomly located in the whole region. Then, we verify the analysis by comparing with simulation results. The analytical and simulation results show that CCP enables to use the original frequency range more effectively than the traditional cellular system regardless of the number of nodes in a cell.

Title:
KNOWLEDGE BASED SYSTEM FOR RELIABLE PERIMETER PROTECTION USING SENSOR NETWORKS
Author(s):
Constantin Voloşencu, Daniel-Ioan Curiac, Ovidiu Banias, Alex Doboli and Octavian Dranga
Abstract:
This paper provides a strategy for perimeter protection using sensor networks with hardware and analytical redundancy. The sensor network reliability is augmented using a knowledge-based system, which implicates the analysis of the trustworthiness of each sensor. For this, we used two stratagems: one that relies on hardware redundancy based on the Confidence Weighted Voting Algorithm and one that relies on analytical redundancy based on a neural perceptron predictor that uses past and present values obtained from neighbouring nodes. This solution can be also a way to discover the malfunctioning nodes that were subjects of an attack and it is localized at the base station level being suitable even for large-scale sensor networks.

Title:
A PRAGMATIC APPROACH FOR QOS IN WIRELESS MESH NETWORKS
Author(s):
Andre Herms and Georg Lukas
Abstract:
In this paper we present a QoS routing protocol for IEEE-802.11 based mesh networks. The main challenge for providing QoS in terms of bandwidth and latency is that the medium is shared between all nodes in close range, which complicates reservation of medium time. Furthermore, the use of standard compliant hardware components requires an integration of the existing medium access mechanism, which is designed for besteffort
communication only. A cluster-based structure is used for representing the local domains of the shared medium and allowing reservation of medium time. On top of this reservation an optimistic reactive algorithm is used for discovery and reservation of routes that fulfil the application specified QoS requirements. Simulation results are presented that prove the correctness of this approach.

Title:
EVALUATION OF MULTI-RADIO EXTENSIONS TO DSR FOR WIRELESS MULTI-HOP NETWORKS
Author(s):
Saad Biaz, Bing Qi, Shaoen Wu and Yiming Ji
Abstract:
Performance on multi-hop networks suffers from limited throughput capacity and poor scalability problems as the network size or density increases (Gupta and Kumar, 2000). One way to alleviate these problems is to equip each node with multiple radios. As hardware cost drops, this approach becomes more and more appealing and feasible. By tuning radios into non-interfering channels, the wireless spectrum can be more efficiently utilized, thus enhancing the whole network performance. This work extensively evaluates Dynamic Source Routing Protocol(DSR) (Johnson and Maltz, 1996) for multi-radio multi-hop networks. Through simulations, DSR with multi-radio extensions exhibits an overall performance improvement for throughput, packet delivery rate and latency.

Title:
WIRELESS HOME NETWORK CONTROL MECHANISM FOR STANDBY POWER REDUCTION
Author(s):
Joon Heo, Choong Seon Hong, Seok Bong Kang and Sang Soo Jeon
Abstract:
Standby power is electric power that a device consumes when not in present use, but plugged in to a source of power and ready to be used. Present estimates indicate that standby power consumption reaches 10 to 15 percent of total residential electrical use. In this paper, we propose a Host-Agent based standby power control mechanism in home network environment. It uses the IEEE 802.15.4 based ZigBee communication protocol between Host and Agent for transmission and secure network. The Agent can acquire the local context information from various embedded sensor and sends the sensing information to the Host. The Host compares this context information from Agent with database and sends the standby power control message to the Agent. To prove the necessity and the efficiency of the proposed control mechanism, we have developed prototype devices and carried out simulation according to control scenario.

Title:
REVISITING THE MARKOV CHAIN MODEL OF IEEE 802.11E EDCA AND INTRODUCING THE VIRTUAL COLLISION PHENOMENON
Author(s):
Mohamad El Masri, Guy Juanole and Slim Abdellatif
Abstract:
IEEE 802.11e specifies the Enhanced Distributed Channel Access (EDCA) for distributed access with traffic differentiation to a Wireless Local Area Network (WLAN). Traffic differentiation led to introducing several traffic queues within each station, thus introducing virtual collision. In this paper, we present a pattern based Markov chain model of EDCA including the virtual collision phenomenon not found in previous work. We also correct the misconceptions found in existing Markov chain models of EDCA (Kong et al., 2004). We thus obtain a more realistic model of IEEE 802.11e EDCA which will allow a more precise performance analysis that may be used for admission control.

Title:
ROLE BASED CROSS-LAYER COMMUNITIES ON WMN
Author(s):
João Paulo Barraca, Susana Sargento and Rui Aguiar
Abstract:
The community notion can be exploited as a rational concept leading users to cooperate in sharing resources on Wireless Mesh Networks. We propose a novel concept for self-organizing networks, where multiple entities (network elements or users) collaborate to achieve common goals, and in particular, to establish the basic connectivity and service delivery infrastructures. The resulting architecture is based on wireless mesh communications, with different entities taking different roles in the communities in a cross-layer approach. These communities can collaborate, leading to increasingly complex and geographically extended scenarios.

Title:
A RELAXED PROBING RATE ADAPTATION IN IEEE802.11 WLANS
Author(s):
Saad Biaz and Shaoen Wu
Abstract:
The availability of multiple rates in IEEE802.11 WLANs and instability of wireless channel conditions call for data rate adaption algorithms to optimize network performance. Rate adaption is the process of assessing instantaneous channel conditions and determining the most appropriate data rate. This paper presents a relaxed probing rate adaptation scheme to determine the most appropriate instantaneous data rate for both downlink and uplink channels, especially in the case where control frames such as RTS/CTS are not available. For this goal, the proposed scheme exploits the mandatory management beacon frame, thus without requiring probing frames like RTS/CTS necessary for other so far proposed schemes. Ns-2 simulations with IEEE802.11b of the proposed scheme yield more than 100% throughput improvement in high density networks. Also, simulations show that the proposed scheme is insensitive to beacon interval.

Title:
WIRELESS MULTIMEDIA CONTINUOUS PACKET CONNECTIVITY (CPC), POWER AMPLIFIER (PA) BACK-OFF AND THE CUBIC METRIC (CM)
Author(s):
Terence E. Dodgson and Mark Horgan
Abstract:
With the every-increasing complexity of (e.g. multi media) signal waveforms generated by transmitters of modern digital communications systems, there comes a corresponding demand for transmitters to continue to operate efficiently (e.g. from a cost per bit and power output point of view) and to produce minimum distortion, within specified limits. This paper looks at how a particular CPC scheme (for efficient resource usage) might be devised and what the resulting impact is on the CM measure. The work uses, as a basis for simulations, mainly the Uplink of the third generation (3G) Wideband Code Division Multiple Access (WCDMA) Release six (R6) system.

Title:
WIRELESS POSITION LOCATION SYSTEM FOR INDOOR ENVIRONMENTS
Author(s):
Matthew D’Souza, Adam Postula and Montserrat Ros
Abstract:
Location systems are used for a variety of navigation applications. Current Location systems are designed to provide accurate distance position coordinates. There are tracking or logistic applications where actual position coordinates are not necessary. Determining the room in a building an object is located can be more useful then the actual coordinates. We present an inexpensive and robust wireless location beacon network that can track the location of emergency responders or users in an indoor environment. Location beacons are placed at predetermined positions in a building. The location beacons are used to determine the presence of the user in an area of a building. The location beacon network does not track the user's coordinates. The location beacon network uses the ZigBee/802.15.4 wireless communications protocol. Our paper examines the use of the Zigbee protocol to determine a user’s location. Two realtime location tracking mechanisms are also analysed and tested. A successful prototype of the location beacon network was created and tested.

Title:
RESOURCE ALLOCATION FOR OFDM SYSTEMS IN THE PRESENCE OF TIME-VARYING CHANNELS
Author(s):
Mort Naraghi-Pour and Xiang Gao
Abstract:
Adaptive resource allocation schemes for OFDM systems designed assuming static channels are known to experience significant performance loss when the channel is time-varying. The inaccuracy in channel state information (CSI) due to outdated channel estimates has been recognized as the main reason for this problem.
To mitigate this effect, we present robust bit and power allocation schemes based on the predicted channel state information. Simulation results show that channel prediction schemes can significantly improve the performance of resource allocation algorithms over time-varying channels.

Title:
THROUGHPUT ENHANCEMENT USING ADAPTIVE DELAY BARRIER FUNCTION OVER HSDPA SYSTEM IN MIXED TRAFFIC SCENARIOS
Author(s):
Yong-Seok Kim
Abstract:
In this paper, we consider a method to enhance the throughput of HSDPA system in the mixed traffic scenario.
Adaptive delay barrier (DB) function and adaptation method are proposed to maximize throughput of besteffort
(BE) traffic with satisfying the delay latency of voice over internet protocol (VoIP) service. Moreover, in order to guarantee quality-of-service (QoS) for the mixed traffics, a design of modified scheduling scheme is provided in this paper. Simulation results show that the throughput of BE traffic service with a channeladaptive DB function increases up to 30%, compared with the conventional scheme, without degrading the capacity of VoIP service over HSDPA system.

Title:
DESIGN CONSIDERATIONS FOR MULTI-CARRIER CDMA BTS POWER AMPLIFIERS
Author(s):
Osama W. Ata
Abstract:
System manufacturers that provide wireless telecommunications equipment to cellular operators, often do not manufacture their own transceivers. They get their own supplies from various base station power amplifier vendors. Unfortunately cellular operators and system providers take design considerations of those primary power amplifiers for granted. The consequences are: Operators are overpaying for base station amplifiers to meet power and capacity demands. Base stations are complicated systems and the optimum technical design considerations of the power amplifier sub-systems have a major impact on multi-carrier Code Division Multiple Access (CDMA) Base Transceiver Station (BTS) performance. This paper discusses those power amplifier vendor claims, demonstrates design considerations and economic design solutions of consequent savings for the operator, based on a realistic market case. We realize that upfront savings, in power amplifier units, in a US market of approximately 550 multi carrier basestation sectors would exceed $ 10 M.

Title:
TURBO SPACE TIME CODES FOR TAILBITING TRANSMISSION
Author(s):
Piotr Remlein and Filip Łęcki
Abstract:
This paper studies a novel technique that combines turbo tailbiting codes over the ring with symbol interleaved space-time modulation. After initial theoretical introduction and analysis, the simulation results are presented. It is shown that for different antenna array sizes, different packet sizes and two kinds of channels the Turbo space time tailbiting coding have a clear advantage over the transmission method with direct truncation.

Title:
A NEW MULTICAST ROUTING ALGORITHM FOR ZIGBEE NETWORKS
Author(s):
Bilge Kartal, Radosveta Sokullu and Tapio Suihko
Abstract:
In recent years, wireless sensor networks have become widely spread in many areas including medical applications. Some of these applications outgrow the traditional communication model applied to wireless sensor networks according to which data is flowing towards a single receiver (sink). In the case of medical data acquisition systems more then one receiver is a viable model. In this paper we discuss details on data broadcast algorithms for the 802.15.4 based ZigBee network standard and their applicability to creating sensor networks for medical data applications, focusing especially on transmitting data to multiple receivers (multicast concept). The multicast concept is not currently supported by ZigBee. So we have focused on introducing a multicast communication model and suggested a new algorithm based on ZigBee which is specifically optimized to support multiple sinks. Further on the paper describes our experiences with developing M-Bee, a multicast routing algorithm platform, using the open Microchip’s ZigBee software stack.

Title:
APPLICATION OF CAUCHY INTEGRAL TO APPROXIMATE THE FIELD COMPONENTS AND CURRENT IN METAL & DIELECTRICAL POLYGONS Method of the Field (Current) Restoration Inside and Outside Flat Closed Contour based on Its Known Values at the Contour
Author(s):
A. V. Ashikhmin, Yu. G. Pasternak, S. L. Podvalny and Yu. A. Rembovsky
Abstract:
The Cauchy integral was proposed as a means to approximate the field components and current in metal and dielectrical polygons. The report illustrates that such a technique can significantly scale down electromagnetic issues solved in spatial- frequency domain. The technique also makes it possible to evaluate the strength of electromagnetic field not only inside the considered closed contour, but outside it even in case when there is no a prior information about object configuration and its physical characteristics.

Title:
A NOVEL APPROACH FOR DESIGNING FRACTAL ANTENNAS
Author(s):
David C. Ni and Chou Hsin Chin
Abstract:
Designing fractal antennas for broadband communications, various modifications and optimisations to the fractal patterns, such as Koch or Sierpinski, are adopted for better frequency responses. In this article, we explore a new approach by defining a set of complex functions, zq ΠCi, where Ci=exp(i*gi(z))[(z-vi)/(1-viz)], and then using the shapes of the solution domains of the functions directly as patterns of fractal antennas.

Title:
CONTRIBUTION AND LIMITS OF A LOSSLESS DATA COMPRESSTION METHOD FOR PERFORMANCE OF OPTICAL WIRELESS CHANNELS IN DIGITAL MULTIMEDEA APPLICATIONS
Author(s):
K. A. Moustafa
Abstract:
For the digital multimedia communication systems, the modification of the transmission rate, transmission capacity and the bandwidth, parameters are an important for the performance of the Optical Wireless Channel (OWLC). Multilevel-Digital pulse Interval Modulation (M-DPIM) is the most method which contributes in the improving of these parameters. The large size of multimedia sources has been performed the main problem for the data transmission. Thus, in this paper a lossless images compression method by Minimizing Pixels Number of Objects (MPNO) is applied. The properties of the Digital Images Transmission (DIT) with and without compression by using MPNO method are discussed. The compression ratio of the MPNO method compared with other compression methods is evaluated. Transmission Parameters Values (TPV) of the M-DPIM system with and without compressed input by using MPNO method are computed. Finally, for special types of the DIT, the MPNO method has been satisfied good results.

Title:
ON THE DVB-SH SYSTEM ARCHITECTURE INCORPORATING T-DMB
Author(s):
Min-Su Shin, Duk-Gil Oh, Un-Rak Choi, Bo-Seok Seo
Abstract:
In this paper, we investigate the transmission system architecture to incorporate the terrestrial digital multimedia broadcasting (T-DMB) service contents into the DVB-SH systems. The T-DMB is operating in Korea to provide a TV-like service in mobile or static environments. The DVB-SH system provides a variety of mobile multimedia services through hybrid satellite and terrestrial links and has a universal coverage. We propose two methods to provide the T-DMB contents to handheld or mobile terminals via DVB-SH architectures and investigate the features of them.

Title:
MATCHING FOR MOBILE USERS IN THE PUBLISH/SUBSCRIBE PARADIGM
Author(s):
A. M. Roumani and D. B. Skillicorn
Abstract:
In a mobile publish/subscribe paradigm, user service discovery and recommendation requires matching user preferences with properties of published services. For example, a user may want to find if there is a moderately priced Chinese restaurant that does not require reservations close by. To generate accurate recommendations, the properties of each user subscription must be matched with those of existing services as accurately as possible. This is a difficult problem when users are mobile, wirelessly connected to a network, and dynamically roaming to different locations. The available data is very large, and the matching must be computed in real time. Existing heuristics are quite ineffective. We propose novel algorithms that use singular value decomposition as a dimension-reduction technique. We introduce “positive” nearest-neighbor matching to find services whose attribute values exceed those of a new user subscription. Making this idea effective requires careful attention to details such as normalization. Performance and quality of matches are reported for datasets representing applications in the mobile publish/subscribe paradigm. For n services and m preference attributes, reasonable matches can be found in time O (mlogn), using O (nm) storage.

Title:
AN INTEGRATED APPROACH TO DEVELOP PERVASIVE MOBILE APPLICATIONS
Author(s):
Hiata Anderson de O. Coelho, Ricardo de O. Anido and Alisson Luiz da Cruz
Abstract:
This article introduces the QuickFrame, a development tool that allows mobile applications to run in several different types of mobile devices. That is only possible due to the fact that the QuickFrame possesses a standard specification language and has the capability of defining the application interface, verifying the target
devices’ specifications and pre-visualizing the user interface. Therefore, several of the problems caused by the large number of mobile device models available and their different specifications are eliminated. Thru reaching to that goal we have a tool to make mobile applications more pervasive.

Title:
A FIRE MONITORING APPLICATION FOR SCATTERED WIRELESS SENSOR NETWORKS A Peer-to-Peer Cross-layering Approach
Author(s):
Luis Bernardo, Rodolfo Oliveira, Ricardo Tiago and Paulo Pinto
Abstract:
A cross-layering alarm application is proposed for supporting fire fighting operations. It runs on scattered wireless sensor networks (WSN) composed by several isolated WSNs, where sensor nodes can be destroyed by fire. Mobile patrol nodes deploy the alarm monitoring application and collect the alarm records, containing the set of sensor measurements above the threshold values. The application was implemented in TinyOS 2.0, on Telos B motes. It uses a new Multimode Hybrid MAC, which can be controlled by the application. The application uses asynchronous mode when no alarms are active to optimise energy consumption; changes to full on mode (without sleeping) to minimise delay during fire handling situations; and uses the synchronous mode (with reserved bandwidth) during the transference of alarm records to the patrol node, balancing delay and energy saving. The alarm application organises sensor nodes into a clustered virtual overlay network and run a peer-to-peer searching service on top of it. This service is used to locate nodes outside the danger area, and to locate alarm records. The application performance was tested using TOSSIM simulations. Simulations results show the application capacity to capture a fire evolution.

Title:
THUMBTRIBES: LOW BANDWIDTH, LOCATION-AWARE COMMUNICATION
Author(s):
John P. T. Moore
Abstract:
Mobile application developers need to design their applications with the constraints of the network in mind. In comparison to inexpensive home broadband networks, mobile networks often exhibit high levels of latency and have limited bandwidth. Another significant difference between these networks is the cost of transporting data. Mobile network operators often apply usage tariffs, especially if the customer is on a prepaid service. In such situations, mobile Internet use can prove costly. To help reduce costs, application developers should try to minimise the amount of data their applications communicate. In this paper we present, thumbtribes, an open source project which attempts to add location-awareness to Internet Relay Chat (IRC) in a network efficient manner.

Title:
INTUITIVE INTERACTION FOR HOME ICT ENVIRONMENTS USING RFID AND BLUETOOTH WIRELESS TECHNOLOGY
Author(s):
Montserrat Ros, Matthew D’Souza, Adam Postula
Abstract:
Different forms of interaction with RFID and Bluetooth enabled devices allow users to access various services. This paper explores intuitive mechanisms for use in the home environment using Bluetooth and Radio Frequency ID (RFID) tag technology. Our approach combines the mobility of wireless communication and the ability to detect user commands by localisation. We discuss the implementation of embedded access points that facilitate the intuitive mechanisms for use with interactive devices such as the digital pen/paper, interactive information board and mobile computing devices. A form of interaction includes the access of web content or services by a user’s mobile computing device by placing it on one of the regions of the interactive information board. Implicit and explicit modes of interaction are also discussed in this paper.

Title:
A PERSONAL FILE SYSTEM OVER EMAIL STORAGES Developing Towards a Persistent Internet Storage for Mobile Users
Author(s):
Chih-Yin Lin, Shih-Fang Chang and Chen-Hwa Song
Abstract:
In 2004 Jones (Jones, 2004) developed a software tool called GmailFS that turns GoogleTM Gmail into a two-gigabyte file folder in the personal computer. Such virtual folder is not just an interesting innovation but quite useful as a backup depot hosted remotely at Google. GmailFS is technically sound but relies critically on the hypertext scripts of Gmail web pages. Thus, it can be easily averted by the mail server administrator with minor changes of the html scripts or web topology. In this paper, we use another approach to achieve the same goal of GmailFS and extend the capability to accommodate all email servers rather than just Gmail. The proposed system is named ePFS that utilizes three primitive email protocols, i.e. SMTP and POP3/IMAP, to respectively store and retrieve the data in and from the e-mail servers. In addition, we enforce security features of user privacy, data confidentiality and error recovery in ePFS. The proposed system is a work in progress heading toward a persistent Internet storage for mobile applications.

Title:
LOCATION BASED GUIDANCE SERVICES IN A MUSEUM ENVIRONMENT: DEPLOYMENT ISSUES AND A PROPOSED ARCHITECTURAL APPROACH
Author(s):
Anastasios Zafeiropoulos, Emmanuel Solidakis, Stavroula Zoi, Nikolaos Konstantinou Panagiotis Stathopoulos and Nikolas Mitrou
Abstract:
In this paper we examine the requirements for deploying advanced Location Based Guidance Services in museum and/or exhibition environments, and we propose an architectural approach that copes with these requirements. The proposed architecture provides automatic and on demand audiovisual content retrieval, both on-site and through the Web, to different classes of users. On-site services are provided through Java-enabled devices, which exploit the user’s contextual state, mainly defined as visitor location and organization of exhibits. The main distinguishing characteristic of the proposed architecture is that it separates the positioning system from the content access mechanisms, while being generic to the selection of the localization technology and the terminal device characteristics. Furthermore, it is built as an open, modular platform comprising a core of reusable components and interfaces for supporting different types of services and devices, including widespread Java and Bluetooth enabled smart phones, while being able to reuse already existing content structures. A test case of a museum e-guidance application for Bluetooth enabled smart phones is presented.

Title:
ON THE USE OF VARIOUS POWER LEVELS TO IMPROVE WIRELESS LAN-BASED POSITIONING Using Multiple Power Levels With Fingerprinting Algorithms
Author(s):
Hendrik Lemelson, Thomas King, Stephan Kopf and Wolfgang Effelsberg
Abstract:
When talking about location-based services, one of the key factors influencing the overall service quality is the
positioning accuracy that the system can rely upon. Nowadays, wireless LAN hardware supports the variation of the transmission power in a wide range. In this paper, two novel algorithms suitable for extension of common wireless LAN-based positioning systems are presented. These novel algorithms exploit the additional information that can be gained by using one or more non-standard transmission power levels. Our findings indicate that the overall positioning accuracy and reliability can be increased with such an approach.

Title:
MOBILEAUDIT A Tool for Contextual Knowledge Management
Author(s):
Olaf Thiele, Hartwig Knapp, Martin Schader and Nicolas Prat
Abstract:
In many professional activities, the ability to retrieve and store knowledge in a mobile situation is crucial. This
need, together with the progress of mobile devices, has led to the emergence of mobile knowledge management. In this paper, we propose a context-aware knowledge management architecture for mobile environments and apply it to an auditing use case. We developed the MobileAudit prototype using the proposed architecture. MobileAudit enables environmental audits according to US as well as European EMAS (ISO 14001) legislation.

Title:
A FLEXIBLE MOBILE NETWORK MONITORING TOOL
Author(s):
Rodrigo M. S. Gonçalves, Bruno M. G. Miranda, Francisco A. B. Cercas
Abstract:
This article presents a model to implement an information system to monitor mobile networks using Key Performance Indicators (KPIs). The proposed model encloses not only the KPI calculations but the translation, importing and presentation of data. It also addresses more advanced topics such as system configuration, node dependencies and routing. A description of the system’s implementation is also presented, from two perspectives: high-level components and technology-related issues. The paper finishes with the presentation of a system application: monitoring a KPI using a data plot generated by the system.

Title:
LINUX MOBILE A Platform for Advanced Future Mobile Services
Author(s):
Frode Sivertsen, Ivar Jørstad and Do van Thanh
Abstract:
Linux has for some time been the operating system of choice for many types of embedded devices (e.g. network devices like routers, as well as multimedia devices like set-top-boxes). Currently, Linux is also gaining momentum as an operating system for mobile phones. This paper studies what it takes to make Linux "go mobile", i.e., what adaptations are necessary to make the Linux kernel fit as a mobile operating system, what is the architecture of such a platform, and what are the major benefits.

Title:
CHALLENGES OF BUILDING END-TO-END NETWORK TOPOLOGIES FOR MULTI-SERVICE NETWORKS
Author(s):
Anne-Marie Bosneag and David Cleary
Abstract:
Building an end-to-end view of the network in multi-service networks is a very important building block in creating a correct view of the capabilities of the network and is therefore crucial for service deployment, activation and management. At the same time, it is a very difficult task to achieve. Current inventory solutions are static in nature, which introduces problems of data consistency between the managed domain and the view at the management node. An end-to-end view of the network is also hard to achieve because no common data model is in use today, and inventory information between different domains is very hard, if not impossible, to obtain using the current solutions. This paper discusses the challenges of building an end-to-end view of the network topology, discusses existing solutions, and proposes Stratus, a flexible unified SOA-based architecture that has been implemented and deployed in our lab. Stratus is based on the MTOSI recommendations for inventory retrieval, and comes with a mechanism for data mapping from domain managers for Public Ethernet and CoreWireline Access Networks to the MTOSI model. It also provides dynamic discovery of the different domains in the network, automatic end-to-end topology creation, and notification systems for automatic updates of the topology based on updates in the network. The experiments show that the proposed solution is technically feasible and compatible with existing inventory solutions.

Title:
A NEW METHODOLOGY FOR ESTIMATING THE SPECTRUM REQUIREMENTS WITH DATA TRAFFIC
Author(s):
Eun-Saem Yang, Hwa-Jong Kim and Won-Seok Yang
Abstract:
In this paper, we present a new methodology for estimating the spectrum requirements of next generation mobile network with multimedia data traffic. In order to fully reflect the characteristics of mobile multimedia data traffic in the spectrum requirement estimation, we take senven factors into account: selfsimilarity of the data traffic, the layered structure of the data traffic, asymmetry of the data traffic between uplink and downlink, engineered capacity considering QoS, regional simultaneous FA increase, uneven traffic pattern among base stations, and handoff traffic overhead.