scholarly journals Experiences from Implementing a Mobile Multiplayer Real-Time Game for Wireless Networks with High Latency

2009 ◽  
Vol 2009 ◽  
pp. 1-14 ◽  
Author(s):  
Alf Inge Wang ◽  
Martin Jarrett ◽  
Eivind Sorteberg

This paper describes results and experiences from designing, implementing, and testing a multiplayer real-time game over mobile networks with high latency. The paper reports on network latency and bandwidth measurements from playing the game live over GPRS, EDGE, UMTS, and WLAN using the TCP and the UDP protocols. These measurements describe the practical constraints of various wireless networks and protocols when used for mobile multiplayer game purposes. Further, the paper reports on experiences from implementing various approaches to minimize issues related to high latency. Specifically, the paper focuses on a discussion about how much of the game should run locally on the client versus on the server to minimize the load on the mobile device and obtain sufficient consistency in the game. The game was designed to reveal all kinds of implementation issues of mobile network multiplayer games. The goal of the game is for a player to push other players around and into traps where they loose their lives. The game relies heavily on collision detection between the players and game objects. The paper presents experiences from experimenting with various approaches that can be used to handle such collisions, and highlights the advantages and disadvantages of the various approaches.

Author(s):  
Alberto Díez Albaladejo ◽  
Fabricio Gouveia ◽  
Marius Corici ◽  
Thomas Magedanz

Next Generation Mobile Networks (NGMNs) constitute the evolution of mobile network architectures towards a common IP based network. One of the main research topics in wireless networks architectures is QoS control and provisioning. Different approaches to this issue have been described. The introduction of the NGMNs is a major trend in telecommunications, but the heterogeneity of wireless accesses increases the challenges and complicates the design of QoS control and provisioning. This chapter provides an overview of the standard architectures for QoS control in Wireless networks (e.g. UMTS, WiFi, WiMAX, CDMA2000), as well as, the issues on this all-IP environment. It provides the state-of-the-art and the latest trends for converging networks to a common architecture. It also describes the challenges that appear in the design and deployment of QoS architectures for heterogeneous accesses and the available solutions. The Evolved Core from 3GPP is analyzed and described as a suitable and promising solution addressing these challenges.


2012 ◽  
Vol 263-266 ◽  
pp. 1208-1213
Author(s):  
Junseok Oh ◽  
Taisiya Kim ◽  
Soo Kyung Park ◽  
Bong Gyou Lee

The mobile network has been developed from 2nd Generation (2G) to Long Term Evolution (LTE) network in Korea. The purpose of this paper is to examine the key factors which affect network development, and to recognize how the mobile carriers and users perceive the rapid change of mobile technology. This study focuses on a pretest to confirm the important factors from the Focus Group Interview (FGI) to Korean Telco representatives and mobile device users. The results show that mobile device users consider devices and contents as more important factors while Korean Telco representatives pursue various strategies and priorities for network evolution. The study will contribute to recognize the differences between providers and users for introducing the new mobile network. Since this paper only describes the pretest results, further research will be conducted with in-depth interview data and statistical approaches.


Author(s):  
Debashis De ◽  
Anwesha Mukherjee ◽  
Srimoyee Bhattacherjee ◽  
Payel Gupta

Authentication procedures are conducted in order to control and stop illegitimate access of such valuable data. This chapter discusses the biometric authentication inside the cloud. The authors describe how biometric information of a user can be securely transmitted and then stored inside the user database maintained in the trusted cloud. Femtocell, a recent development in mobile network using which secures biometric data transmission from the mobile device to the cloud, is discussed in this chapter.


2019 ◽  
pp. 859-875
Author(s):  
Debashis De ◽  
Anwesha Mukherjee ◽  
Srimoyee Bhattacherjee ◽  
Payel Gupta

Authentication procedures are conducted in order to control and stop illegitimate access of such valuable data. This chapter discusses the biometric authentication inside the cloud. The authors describe how biometric information of a user can be securely transmitted and then stored inside the user database maintained in the trusted cloud. Femtocell, a recent development in mobile network using which secures biometric data transmission from the mobile device to the cloud, is discussed in this chapter.


TEKNOKOM ◽  
2021 ◽  
Vol 4 (2) ◽  
pp. 43-47
Author(s):  
Sigit Wibawa

This paper provides an overview of the wireless handoff process on wireless networks by investigating Authentication Protocol using EAP -AKA (Extensible Authentication Protocol) - Authentication and Key Agreement The EAP-AKA protocol was developed for LAN networks or mobile network devices, the authors found ineffective network procedures guaranteed that made the attacks MITM and DoS attacks may occur. In addition, we find the storage procedures and resource submissions not safe enough to withstand DoS attacks. Focusing on Both types of attacks, the authors are interested in existing security protocol methods and written by researchers, then perform Systematic Literature Review (SLR) by using international journals database ie from the IEEE organization with the use of wireless handoff attack keyword in the middle of the world and obtained some related journals which need further research to deepen the Systematic Literature review, by offering a structured, methodical, and meticulous approach to understanding the research trends of handoff security issues on wireless networks and mobile networks. The purpose of this research is to provide credible intellectual guidance for future researchers to help them identify areas in the study. Most SLR is limited to conference papers and journal articles published by IEEE from 2015 to 2021. This study reveals that the protocol, privacy and security of the handoff process are the least studied, while the operating problems, architecture, methods in the handoff process get much attention in the literature.


2020 ◽  
Vol 2020 (14) ◽  
pp. 378-1-378-7
Author(s):  
Tyler Nuanes ◽  
Matt Elsey ◽  
Radek Grzeszczuk ◽  
John Paul Shen

We present a high-quality sky segmentation model for depth refinement and investigate residual architecture performance to inform optimally shrinking the network. We describe a model that runs in near real-time on mobile device, present a new, highquality dataset, and detail a unique weighing to trade off false positives and false negatives in binary classifiers. We show how the optimizations improve bokeh rendering by correcting stereo depth misprediction in sky regions. We detail techniques used to preserve edges, reject false positives, and ensure generalization to the diversity of sky scenes. Finally, we present a compact model and compare performance of four popular residual architectures (ShuffleNet, MobileNetV2, Resnet-101, and Resnet-34-like) at constant computational cost.


2018 ◽  
Author(s):  
Phanidra Palagummi ◽  
Vedant Somani ◽  
Krishna M. Sivalingam ◽  
Balaji Venkat

Networking connectivity is increasingly based on wireless network technologies, especially in developing nations where the wired network infrastructure is not accessible to a large segment of the population. Wireless data network technologies based on 2G and 3G are quite common globally; 4G-based deployments are on the rise during the past few years. At the same time, the increasing high-bandwidth and low-latency requirements of mobile applications has propelled the Third Generation Partnership Project (3GPP) standards organization to develop standards for the next generation of mobile networks, based on recent advances in wireless communication technologies. This standard is called the Fifth Generation (5G) wireless network standard. This paper presents a high-level overview of the important architectural components, of the advanced communication technologies, of the advanced networking technologies such as Network Function Virtualization and other important aspects that are part of the 5G network standards. The paper also describes some of the common future generation applications that require low-latency and high-bandwidth communications.


Sign in / Sign up

Export Citation Format

Share Document