首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
The thin‐client computing model has the potential to significantly increase the performance of mobile computing environments. By delivering any application through a single, small‐footprint client (called a thin client) implemented on a mobile device, it is possible to optimize application performance without the need for building wireless application gateways. We thus present two significant contributions in the area of wireless thin‐client computing. Firstly, a mathematical performance model is derived for wireless thin‐client system. This model identifies factors that affect the performance of the system and supports derivation and analysis of adaptation strategies to maintain a user‐specified quality of service (QoS). Secondly, a proxy‐based adaptation framework is developed for wireless thin‐client systems, which dynamically optimizes performance of a wireless thin client via dynamically discovered context. This is implemented with rule‐based fuzzy logic that responds to variations in wireless link bandwidth and client processing power. Our fuzzy inference engine uses contextual data to dynamically optimize tradeoffs among different quality of service parameters offered to the end users. Additionally, our adaptation framework uses highly scalable wavelet‐based image coding to provide scalable QoS that can degrade gracefully. Our thin‐client adaptation framework shields the user from ill effects of highly variable wireless network quality and mobile device resources. This improves performance of active applications, in which the display changes frequently. Further, active application behaviour may produce high transmission latency for screen updates, which can adversely affect user perception of QoS, resulting in poor interactivity. We report measured adaptive performance under realistic mobile device and network conditions for several different clients and servers. Copyright © 2008 John Wiley & Sons, Ltd.  相似文献   

2.
As different types of wireless networks are converging into an all-IP network, i.e., the Internet, it can be expected that in the near future video-on-demand (VoD) will be widely applied to many interesting services, and users can access these services using heterogeneous terminals via heterogeneous wired/wireless access networks. Many periodic broadcasting protocols have been proposed to reduce the implementation cost of VoD systems. However, most of the protocols assumed homogeneity for user terminals, while in practice, user terminals are usually quite different in their processing power, buffer space, and power. To address this problem, a few periodic broadcasting protocols providing the same video quality for all heterogeneous clients have been proposed recently. In this paper, we proposed a novel heterogeneous VoD broadcasting technique called Catch and Rest (CAR) to accommodate bandwidth heterogeneity without sacrificing user video quality. Then, we provide mathematic analysis to calculate the client bandwidth and buffer space requirements of CAR. Finally, we present our performance evaluation results for CAR. Our results show that under the same system resources (i.e., server and network bandwidth), CAR provides more uniform and acceptable service latency for all heterogeneous clients compared to previous works.  相似文献   

3.
To provide mutual authentication and communication confidentiality between mobile clients and servers, numerous identity‐based authenticated key agreement (ID‐AKA) protocols were proposed to authenticate each other while constructing a common session key. In most of the existing ID‐AKA protocols, ephemeral secrets (random values) are involved in the computations of the common session key between mobile client and server. Thus, these ID‐AKA protocols might become vulnerable because of the ephemeral‐secret‐leakage (ESL) attacks in the sense that if the involved ephemeral secrets are compromised, an adversary could compute session keys and reveal the private keys of participants in an AKA protocol. Very recently, 2 ID‐AKA protocols were proposed to withstand the ESL attacks. One of them is suitable for single server environment and requires no pairing operations on the mobile client side. The other one fits multi‐server environments, but requires 2 expensive pairing operations. In this article, we present a strongly secure ID‐AKA protocol resisting ESL attacks under mobile multi‐server environments. By performance analysis and comparisons, we demonstrate that our protocol requires the lowest communication overhead, does not require any pairing operations, and is well suitable for mobile devices with limited computing capability. For security analysis, our protocol is provably secure under the computational Diffie‐Hellman assumption in the random oracle model.  相似文献   

4.
Rapid evolution in information and communication technologies has facilitated us to experience mobile communication in our daily routine. Mobile user can only avail the services from the server, once he/she is able to accomplish authentication process successfully. In the recent past, several researchers have contributed diverse authentication protocols for mobile client‐server environment. Currently, Lu et al designed two‐factor protocol for authenticating mobile client and server to exchange key between them. Lu et al emphasized that their scheme not only offers invincibility against potential security threats but also offers anonymity. Although this article reveals the facts that their protocol is vulnerable against client and server impersonation, man‐in‐the‐middle, server key breach, anonymity violation, client traceability, and session‐specific temporary attacks, therefore, we have enhanced their protocol to mitigate the above mention vulnerabilities. The enhanced protocol's security strength is evaluated through formal and informal security analysis. The security analysis and performance comparison endorses the fact that our protocol is able to offer more security with least possible computation complexity.  相似文献   

5.
Wireless networks are now very essential part for modern ubiquitous communication systems. The design of efficient routing and scheduling techniques for such networks have gained importance to ensure reliable communication. Most of the currently proposed geographic routing protocols are designed for 2D spatial distribution of user nodes, although in many practical scenarios user nodes may be deployed in 3D space also. In this paper, we propose 3D routing protocols for multihop wireless networks that may be implemented in two different ways depending on how the routing paths are computed. When the routing paths to different user nodes from the base station in the wireless network are computed by the base station, we call it centralized protocol (3DMA‐CS). A distributed routing (3DMA‐DS) protocol is implemented when respective routing path of each user node to the base station is computed by the user node. In both of these protocols, the user (base station) selects the relay node to forward packets in the direction of destination, from the set of its neighbours, which makes minimum angle with the reference line drawn from user (base station) to the base station (user), within its transmission range. The proposed protocols are free from looping problem and can solve the void node problem (VNP) of multihop wireless networks. Performance analysis of the proposed protocol is shown by calculating end‐to‐end throughput, average path length, end‐to‐end delay, and energy consumption of each routing path through extensive simulation under different network densities and transmission ranges.  相似文献   

6.
即时通信通过互联网给人们提供了便捷的通信手段,针对手机覆盖区域和效果的不断提升,提出一种在流行的Android手机操作系统上,实现客户端与客户端之间的即时通信的设计方案。设计基于开源的XMPP即时通信协议,采用C/S体系结构,通过GPRS无线网络用TCP协议连接到服务器,以架设开源的Openfire服务器作为即时通讯平台,极大地方便了互联网通信不畅的用户。  相似文献   

7.
The past few years have witnessed a surge of wireless mesh networks (WMNs)‐based applications and heterogeneous WMNs are taking advantage of multiple radio interfaces to improve network performance. Although many routing protocols have been proposed for heterogeneous WMNs, most of them mainly relied on hierarchical or cluster techniques, which result in high routing overhead and performance degradation due to low utilization of wireless links. This is because only gateway nodes are aware of all the network resources. In contrast, a unified routing protocol (e.g., optimal link state routing (OLSR)), which treats the nodes and links equally, can avoid the performance bottleneck incurred by gateway nodes. However, OLSR has to pay the price for unification, that is, OLSR introduces a great amount of routing overhead for broadcasting routing message on every interface. In this paper, we propose unified routing protocol (URP), which is based on passive bandwidth measurement for heterogeneous WMNs. Firstly, we use the available bandwidth as a metric of the unification and propose a low‐cost passive available bandwidth estimation method to calculate expected transmission time that can capture the dynamics of wireless link more accurately. Secondly, based on the estimated available bandwidth, we propose a multipoint relays selection algorithm to achieve higher transmission ability and to help accelerate the routing message diffusion. Finally, instead of broadcasting routing message on all channels, nodes running URP transmit routing message on a set of selected high bandwidth channels. Results from extensive simulations show that URP helps improve the network throughput and to reduce the routing overhead compared with OLSR and hierarchical routing. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   

8.
基于组播的流调度算法能够有效降低服务器和网络带宽消耗。但研究表明,在用户进行VCR交互操作情况下,这些算法的性能将急剧恶化。该文提出一种有效支持用户交互的视频点播系统流调度方案:常规组播固定调度RMFS。RMFS采用基于请求类的接纳控制策略,并通过流合并机制来合并单播流。分析了RMFS方案的最佳组播间隔、最佳请求阈值和最小服务器容量需求。仿真结果验证了分析模型的正确性和RMFS方案的可行性。  相似文献   

9.
Message‐locked encryption (MLE) is a widespread cryptographic primitive that enables the deduplication of encrypted data stored within the cloud. Practical client‐side contributions of MLE, however, are vulnerable to a poison attack, and server‐side MLE schemes require large bandwidth consumption. In this paper, we propose a new client‐side secure deduplication method that prevents a poison attack, reduces the amount of traffic to be transmitted over a network, and requires fewer cryptographic operations to execute the protocol. The proposed primitive was analyzed in terms of security, communication costs, and computational requirements. We also compared our proposal with existing MLE schemes.  相似文献   

10.
The multiple access control (MAC) problem in a wireless network has intrigued researchers for years. For a broad-band wireless network such as wireless ATM, an effective MAC protocol is very much desired because efficient allocation of channel bandwidth is imperative in accommodating a large user population with satisfactory quality of service. Indeed, MAC protocols for a wireless ATM network in which user traffic requirements are highly heterogeneous (classified into CBR, VBR, and ABR), are even more intricate to design. Considerable research efforts expended in tackling the problem have resulted in a myriad of MAC protocols. While each protocol is individually shown to be effective by the respective designers, it is unclear how time different protocols compare against each other on a unified basis. In this paper, we quantitatively compare seven previously proposed TDMA-based MAC protocols for integrated wireless data and voice services. We first propose a taxonomy of TDMA-based protocols, from which we carefully select seven protocols, namely SCAMA, DTDMA/VR, DTDMA/PR, DQRUMA, DPRMMA, DSA++, and PRMA/DA, such that they are devised based on rather orthogonal design philosophies. The objective of our comparison is to highlight the merits and demerits of different protocol designs  相似文献   

11.
摘 要: 对HTTP Live Streaming深入研究之后,发现该协议在直播流媒体传输过程中存在视频流索引文件重复传送的问题。详细阐述了服务器与客户端之间的交互过程,并通过对网络监控软件的使用,检测到交互过程中服务器传输给客户端的视频流索引文件存在较大的冗余,造成网络带宽开销增大。提出一种可行的改进方案,在.M3U8文件中添加一个#EXT-X-MEDIA-SEQUENCE-LAST标签,并使服务器和客户端都对该标签进行识别。通过对网络占用率的对比分析,改进后的方案对网络带宽的占用率明显减小,进而验证了该改进方案的可行性。  相似文献   

12.
Mutual authentication is used to validate the legitimacy of a remote login user and a server. Conventional user authentication protocols are suited to solve the privacy and security problems for the single client/server architecture environment. However, the use of computer networks and information technology has grown spectacularly. More and more network architectures are used in multi‐server environments. Recently, several authentication schemes for multi‐server environments have been proposed. However, the performance of these schemes is not suitable for applications. To improve the performance, we propose a new ID‐based mutual authentication protocols for multi‐server environment without bilinear pairings. We also show that the proposed scheme is provable secure in the random oracle model. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

13.
Network Bandwidth Requirements for Scalable On-Demand Streaming   总被引:1,自引:0,他引:1  
Previously proposed streaming protocols using broadcast or multicast are able to deliver multimedia files on-demand with required server bandwidth that grows much slower than linearly with request rate, or with the inverse of client start-up delay. The same efficiencies can be achieved for network bandwidth if delivery is over a true broadcast channel. This paper considers the required network bandwidth for on-demand streaming over multicast delivery trees. We consider both simple canonical delivery trees, and more complex cases in which delivery trees are constructed using both existing and new algorithms for randomly generated network topologies and client site locations. Results in this paper quantify the potential savings from use of multicast trees that are configured to minimize network bandwidth rather than the latency to the content server. Further, we determine the network bandwidth usage of particular immediate service and periodic broadcast on-demand streaming protocols. The periodic broadcast protocol is able to simultaneously achieve close to the minimum possible network and server bandwidth usage.  相似文献   

14.
This paper presents a multimedia streaming platform for efficiently transmitting MPEG‐4 content over IP networks. The platform includes an MPEG‐4 compliant streaming server and client, supporting object‐based representation of multimedia scenes, interactivity, and advanced encoding profiles defined by the ISO standard. For scalability purposes, we employ an application‐layer multicast scheme for media transmission using overlay networks. The overlay network, governed by the central entity of the network distribution manager, is dynamically deployed according to a set of pre‐defined criteria. The overlay network supports both broadcast delivery and video‐on‐demand content. The multimedia streaming platform is standards‐compliant and utilizes widespread multimedia protocols such as MPEG‐4, real‐time transport protocol, real‐time transport control protocol, and real‐time streaming protocol. The design of the overlay network was architected with the goal of transparency to both the streaming server and the client. As a result, many commercial implementations that use industry‐standard protocols can be plugged into the architecture relatively painlessly and can enjoy the benefits of the platform.  相似文献   

15.
Debiao He 《Ad hoc Networks》2012,10(6):1009-1016
With the continue evaluation of mobile devices in terms of the capabilities and services, security concerns increase dramatically. To provide secured communication in mobile client–server environment, many user authentication protocols from pairings have been proposed. In 2009, Goriparthi et al. proposed a new user authentication scheme for mobile client–server environment. In 2010, Wu et al. demonstrated that Goriparthi et al.’s protocol fails to provide mutual authentication and key agreement between the client and the server. To improve security, Wu et al. proposed an improved protocol and demonstrated that their protocol is provably secure in random oracle model. Based on Wu et al.’s work, Yoon et al. proposed another scheme to improve performance. However, their scheme just reduces one hash function operation at the both of client side and the server side. In this paper, we present a new user authentication and key agreement protocol using bilinear pairings for mobile client–server environment. Performance analysis shows that our protocol has better performance than Wu et al.’s protocol and Yoon et al.’s protocol. Then our protocol is more suited for mobile client–server environment. Security analysis is also given to demonstrate that our proposed protocol is provably secure against previous attacks.  相似文献   

16.
Low power consumption is a key design metric for portable wireless network devices where battery energy is a limited resource. The resultant energy efficient design problem can be addressed at various levels of system design, and indeed much research has been done for hardware power optimization and power management within a wireless device. However, with the increasing trend towards thin client type wireless devices that rely more and more on network based services, a high fraction of power consumption is being accounted for by the transport of packet data over wireless links [28]. This offers an opportunity to optimize for low power in higher layer network protocols responsible for data communication among multiple wireless devices. Consider the data link protocols that transport bits across the wireless link. While traditionally designed around the conventional metrics of throughput and latency, a proper design offers many opportunities for optimizing the metric most relevant to battery operated devices: the amount of battery energy consumed per useful user level bit transmitted across the wireless link. This includes energy spent in the physical radio transmission process, as well as in computation such as signal processing and error coding. This paper describes how energy efficiency in the wireless data link can be enhanced via adaptive frame length control in concert with adaptive error control based on hybrid FEC (forward error correction) and ARQ (automatic repeat request). Key to this approach is a high degree of adaptivity. The length and error coding of the atomic data unit (frame) going over the air, and the retransmission protocol are (a) selected for each application stream (ATM virtual circuit or IP/RSVP flow) based on quality of service (QoS) requirements, and (b) continually adapted as a function of varying radio channel conditions due to fading and other impairments. We present analysis and simulation results on the battery energy efficiency achieved for user traffic of different QoS requirements, and describe hardware and software implementations.  相似文献   

17.
Wireless sensor network consists of sensor nodes with battery operated device. The key challenges in the wireless sensor network are energy consumption and routing optimization. This work presents the cluster based load balancing (CBLB) routing protocol. The proposed routing protocol is used to minimize the energy consumption and increase the routing performance. It avoids the routing robustness, delay and increases the delivery rate and network performance. In existing techniques, different routing protocols such as LEACH, HEED and MESTER were used to increase the network performance and to decrease the energy consumption. But these existing techniques did not satisfy the performance requirements of wireless sensor networks. Hence, there is a requirement to develop a technique that meets the QoS requirements and needs of wireless sensor network. The proposed CBLB routing protocol creates a cluster head in the decentralized network and the cluster head will be used to distribute the workload evenly to the cluster members for reducing the energy consumption in wireless sensor network. Experimental results analyze the performance of the proposed protocol with the different existing protocols. The proposed protocol achieves high throughput, delivery rate and reduces the energy consumption, delay and routing overhead.  相似文献   

18.
We present a new network design problem that is applicable for designing virtual paths (VPs) in an asynchronous transfer mode (ATM) network to efficiently support client/server applications. We present several alternatives for the solution, compare their properties, and focus on a novel “greedy” solution, which we prove to optimize certain important criteria (namely, the network overhead for a request/response and the utilization of bandwidth and routing table resources). We also present simulation results that demonstrate the performance and scalability of our solution. In addition, we propose a new efficient bandwidth allocation scheme which is tailored for client/server applications over ATM networks  相似文献   

19.
Lee  S.-J. Gerla  M. Toh  C.-K. 《IEEE network》1999,13(4):48-54
Bandwidth and power constraints are the main concerns in current wireless networks because multihop ad hoc mobile wireless networks rely on each node in the network to act as a router and packet forwarder. This dependency places bandwidth, power, and computation demands on mobile hosts which must be taken into account when choosing the best routing protocol. In previous years, protocols that build routes based on demand have been proposed. The major goal of on-demand routing protocols is to minimize control traffic overhead. We perform a simulation and performance study on some routing protocols for ad hoc networks. The distributed Bellman-Ford (1957, 1962), a traditional table-driven routing algorithm, is simulated to evaluate its performance in multihop wireless network. In addition, two on-demand routing protocols (dynamic source routing and associativity-based routing) with distinctive route selection algorithms are simulated in a common environment to quantitatively measure and contrast their performance. The final selection of an appropriate protocol will depend on a variety of factors, which are discussed in this article  相似文献   

20.
Mobility support in wireless Internet   总被引:7,自引:0,他引:7  
The tremendous advancement and popularity of wireless access technologies necessitates the convergence of multimedia (audio, video, and text) services on a unified global (seamless) network infrastructure. Circuit-switched proprietary telecommunication networks are evolving toward more cost-effective and uniform packet-switched networks such as those based on IP. However, one of the key challenges for the deployment of such wireless Internet infrastructure is to efficiently manage user mobility. To provide seamless services to mobile users, several protocols have been proposed over the years targeting different layers in the network protocol stack. In this article we present a cross-layer perspective on the mobility protocols by identifying the key features of their design principles and performance issues. An analysis of the signaling overhead and handoff delay for some representative protocols in each layer is also presented. Our conclusion is that although the application layer protocol is worse than the protocols operating in the lower layers, in terms of handoff delay and signaling overhead, it is better suited as a potential mobility solution for the next-generation heterogeneous networks, if we consider such factors as protocol stack modification, infrastructure change, and inherent operational complexity.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号