ArticlePDF Available

Android Application For Audio Conference Using IEEE 802.11

Authors:
  • Dr.N.G.P Institute of Technology - Coimbatore

Abstract and Figures

Networking has been the most important technology in human history. There are several ways of communicating through network. Topologies where developed in order to communicate efficiently. WIFI plays a crucial role in nowadays network. This proposed work describes the live audio broadcasting through WIFI network make effective utilization of short ranged communication systems. This paper presence a new audio broadcasting system based on wireless network and the data are transmitted through WIFI. Android application is developed in order to broadcast live audio streaming using User Datagram Protocol (UDP). The purpose of this experiment is to find better ways of utilizing sharing of data through WIFI network. The purposed system is developed using android version 3.3 which was java programming language. Using these application users can speak with each other via half duplex methodology. The detailed audio broadcasting through WIFI networks are demonstrated in this paper.
Content may be subject to copyright.
www.ijaceeonline.com ISSN: 2456 - 3935
International Journal of Advances in Computer and Electronics Engineering
Volume 4, Issue 5, May 2019, pp. 7-14
Android Application For Audio Conference
Using IEEE 802.11
Dr. Sivakumar Sabapathy Arumugam
Assistant Professor, Department of ECE, Info Institute of Engineering, Coimbatore, India
Email: siva3cool@gmail.com
Dinesh Rengasamy
UG Scholar, Department of ECE, Info Institute of Engineering, Coimbatore, India
Email: dineshr1507@gmail.com
Karthikeyan Ganesan
UG Scholar, Department of ECE, Info Institute of Engineering, Coimbatore, India
Email: karthikeyang235@gmail.com
Kirthika Iyappan
UG Scholar, Department of ECE, Info Institute of Engineering, Coimbatore, India
Email: kirthikeerthisk@gmail.com
Kiruthika Sundharamoorthi
UG Scholar, Department of ECE, Info Institute of Engineering, Coimbatore, India
Email: kiruthiece1999@gmail.com
Abstract Networking has been the most important technology in human history. There are several ways of
communicating through network. Topologies where developed in order to communicate efficiently. WIFI plays a
crucial role in nowadays network. This proposed work describes the live audio broadcasting through WIFI
network make effective utilization of short ranged communication systems. This paper presence a new audio
broadcasting system based on wireless network and the data are transmitted through WIFI. Android
application is developed in order to broadcast live audio streaming using User Datagram Protocol (UDP). The
purpose of this experiment is to find better ways of utilizing sharing of data through WIFI network. The
purposed system is developed using android version 3.3 which was java programming language. Using these
application users can speak with each other via half duplex methodology. The detailed audio broadcasting
through WIFI networks are demonstrated in this paper.
Keyword: Networking, Audio broadcasting, WIFI Network, WIFI.
1. INTRODUCTION
Network is backbone of communication technol-
ogy. Networking aims to provide quality communica-
tion with multiple clients. Topologies are used to
control the network structure. Different topologies
provide different structures such as Bus topology,
Ring topology, Star topology, etc. Smart phone tech-
nology is widely used all around the globe which uses
networks in order to communicate with one another.
Statistics says 730.7 million people in India using
smart phones which default consists of wireless fidel-
ity and hotspot connections. Wireless network con-
nections are used nowadays, in order to minimize the
cost and to establish continuous connection to a
moving object such as mobile phone. Reason for net-
work implementation is to share information.
Smartphones is one the common medium everyone
uses to share information. WIFI network is used by
every smartphone users to share data between them.
Nowadays using WIFI, data such as audio, video, zip
files, etc…, can be shared. Enhancing this ability, the
live data sharing can be done.
This provides a short range communication which
is completely independent of the mobile network.
Since WIFI and mobile network are completely inde-
pendent of each other. The Wi-Fi security protocol
currently in use is WPA2 PSK (Wi-Fi Protected Ac-
cess 2 Pre-Shared Key), which is the security pro-
vided for the proposed application. This system con-
sists of API level 21, User Datagram Protocol (UDP)
Cite this paper:
Sivakumar Sabapathy Arumugam, Dinesh Rengasamy,
karthikeyan Ganesan, Kirthika Iyappan, kiruthika
Sundharamoorthi, Android application for audio conference using
IEEE 802.11”, International Journal of Advances in Computer a nd
Electronics Engineering, Vol. 4, No. 5, pp. 7-14, May 2019.
ISSN: 2456 - 3935
International Journal of Advances in Computer and Electronics Engineering
Volume 4, Issue 5, May 2019, pp. 714
www.ijaceeonline.com 8
used for network communication, divider is used to
split the payload and user friendly GUI. Which uses
WIFI or hotspot to share information. Even though
UDP is unreliable but faster than TCP. So by using
UDP, fast transmission of information in WIFI net-
work can be achieved. In order to minimize the la-
tency between the packets UDP is preferred over
TCP.
2. EXISTING SYSTEM
2.1 Arduino Based Wi-Fi Enabled Wireless
Speaker
This work mainly tells about the transmission of
audio from the computer to the Wi-Fi connected
speakers. If we play music in the computer, sound
will come from the connected Wi-Fi speakers. For ex:
we can use it in party setting ,if one plays a music in
the computer in a room ,with the help of Wi-Fi con-
nected speakers we can hear the music inside the
house.so we can keep the computer in the locked
room for safety purpose. This system contains Micro-
controller receiver module (AT Mega 328p) and com-
puter program used to send audio data [1]. In Ar-
duino, we can connect CPU board to various inter-
changeable add on shields. Audio was transmitted
over 802.11 protocols using PC with wireless LAN.
Data has been received using wireless LAN module.
Figure 1 Block Diagram of wireless speaker
Using Arduino controller, the received data has
been passed. To get the specified audio format, we
use audio decoder with speaker which receives data
from arduino controller. By using the arduino the
system was well enhanced with better audio quality
by considering the small buffer limitations of the mi-
crocontroller and could recover from seconds of lost
for this period of time. The system is further more
relatively robust. By using the microcontroller with on
board RAM will increase the audio buffer for long
period of time, which will decrease the receiver sen-
sitivity. In this system, the device will support more
file formats which was allowed to play in the com-
puter. In future, the system was enhanced by using
microcontroller inherited with Wi-Fi module. The
block diagram is shown in Figure 1.
2.2 Indoor Mobile Localization Based On Wi-
Fi Fingerprint’s Important Access Point
This work says that on basis of important access
point (IAP), Wi-Fi fingerprint localization method is
used. The important access point is that the Wi-Fi
access point with the received signal strength which is
used for the Wi-Fi fingerprint. Here, from the data-
base, fingerprints are picked with the same IAP which
is said to be the estimated fingerprint. The similarity
degree is determined by the distance and the AP repe-
tition estimated location is calculated by the finger-
print location which gets matched up with the esti-
mated fingerprint. PS is not used in indoor environ-
ments as it issues accurate and reliable position in-
formation .researches found many localization tech-
niques such as RFID, Wi-Fi etc. to overcome this
drawbacks. Wi-Fi based indoor positioning has two
divisions. Both the division has the localization algo-
rithms, where first division is based on signal propa-
gation model and second division based on position
fingerprints [2]. The block diagram of indoor mobile
localization is shown in Figure 2.
Figure 2 Block Diagram
The measured signal strength is converted into dis-
tance information using signal propagation model.
By using distance between the moving target and
multiple access point, the target coordinates can be
calculated. Wi-Fi signal is harmed to environmental
factors such as walls, doors, etc. in transmission of
signal. The fingerprint localization algorithm has two
parts. They are offline establishment of location-fin-
gerprint database and online processing. From this
ISSN: 2456 - 3935
International Journal of Advances in Computer and Electronics Engineering
Volume 4, Issue 5, May 2019, pp. 714
www.ijaceeonline.com 9
project, we can identify mobile phones wherever it
may be. The disadvantage is that as the fingerprints
distance is increased, the range of fingerprint match-
ing is reduced [3].
2.3 Authentication Based Wi-Fi Calling For
Mobile Phones
In this work, we discuss about the cell phones with
WIFI and their communication inside WLAN. This is
the form of telecommunication where the data is sent
to large interconnected networks. Two persons com-
municate through 2.4GHZ communication channel
with WIFI Enabled and J2ME platform. To call one
person, the user will send packets to router and then
will identify the client [4].
By using UNC, Wi-Fi server turns the call to
GSM. By using communication channel with cryptog-
raphy techniques, we can overcome the channel being
affected by hacking. In this network delivery ratio and
the total number of messages are generated. The se-
cond performance metrics is message dissemination
scope. The third performance metrics is average delay
which is the average time of delivered messages. And
the last metrics is the energy consumption which is
the ratio of total energy in PSN to number of human
carried phones. The block diagram for Wi-Fi calling
is shown in Figure 3.
Figure 3 Block Diagram
The algorithm used in the system is shortest path
algorithm and novel algorithm. Cost is involved in
initial stage only and then free for all other networks.
Based on multi hop networks, the model is extended
for multi-channel, multiple interference.
2.4 Energy Efficient Phone -To- Phone Com-
munication Based On Wifi Hotspot in PSN
The system is based on pocket switched networks
(PSN), which utilize both human mobility and occa-
sional connectivity to transfer messages between mo-
bile human devices [6].
Nowadays large number of mobile phones has
come into daily lives. Therefore in the paper they pro-
posed that the Wi-Fi hotspot mode of a mobile phone
is applied in the PSN, in order to realize the phone to
phone communication. The illustration of the energy
efficient system is shown in Figure 4.
Figure 4 Energy Efficient System
In Wi-Fi Hotspot mode the phone will rapidly con-
sume energy and the battery life will be shortening
significantly. The message discrimination scope can
be maximized within the limited energy constraint of
each phone is PSN. The phone is switched between
hotspot modes on the basis of energy efficient phone
to phone communication method [7].
The best performance can be achieved by energy
consumption and message dissemination among dif-
ferent switch strategies .the communication can be
possible if one is in the hotspot mode and other in
client mode .the energy consumption will reduce the
battery of phone in absence of energy supply. We use
scheduling strategies to switch phone between two
modes .this will show best performance [8].
2.5 Dark Side Of Operational Wi-Fi Calling
Services
In this paper, they are subjected to better Volte
(voice over LTE) and VoIP services. They give us a
technique called 3GPP IMS (IP multimedia sub sys-
tem) to place cellular calls over WIFI network
[9].This mechanism is same as Volte, which include
SIM based security, IPSEC (Internet Protocol Secu-
rity), 3GPP AKA (Authentication and Key Agree-
ment).Without cellular base stations mobile users can
send/receive messages and calls with use of WIFI
networks[10]. .The block diagram of Wi-Fi calling
devices is shown in Figure 5.
HOTSPOT
MODE
CLIENT
MODE
HOTSPOT
MODE
CLIENT
MODE
NOT
CONNECTED
Connected
Connected
Connected
VLR
MSC
HLR
MS Wi-Fi
GSM-IP VLR
GSM
GATEWAY
PC
Wi-Fi
MODULE
TRANSMITTER
GSM NETWOR K
IP
NETWORK
ISSN: 2456 - 3935
International Journal of Advances in Computer and Electronics Engineering
Volume 4, Issue 5, May 2019, pp. 714
www.ijaceeonline.com 10
Figure 5 Block Diagram of Wi-Fi calling services
The defects in Wi-Fi calling devices are by four
vulnerabilities. From these vulnerabilities they give us
two proof-of-concept affects. The two proof-of-con-
cept attacks are user privacy leakage and telephony
harassment or denial of voice service attack (THDoS)
[11].
3. PROPOSED SYSTEM
This android application is developed with android
development version 3.3 which uses java as the pro-
gramming language. The utilization of technology to
its maximum is necessary to provide efficient output
required. In order to establish communication within
short range say for example an office, a massive
amount of money will be spend in order to establish a
network where all the employees are connected. And
with which the sharing of information is done through
landline telephones. In security cases the policemen in
a certain region are connected through walkie-talkies.
It costs so high and has given to be individual to all
policemen who are in the field. So in this proposed
work an android application is developed which is
able to:
Eradicate the usage communication devices such as
walkie-talkies and landline telephones. Utilization of
the Wi-Fi data sharing can be updated. Any modifica-
tion in the android smart phones is not required (suit-
able for any android above version 5).Supports any
form of wireless fidelity such as MODEM, routers,
hotspots, etc.
The block diagram of the proposed system is shown
in Figure 6. In this proposed system live audio confer-
ence through Wi-Fi network can be done using an
android application. This system is developed using
android 3.3, the protocol used in this system to trans-
mit data or packets is UDP. The processor which is
default in the smart phone is connected to a Wi-Fi
network. The network can be of any form of wireless
fidelity. Notification will be given to individual users
before the conference starts. After attaining the neces-
sary information from all the individual users the con-
ference takes place. This system can reduce the usage
of external short range communicating devices.
The working of this proposed technique is illus-
trated as follows: The default processor in the smart
phone is connected to the wireless fidelity. After es-
tablishing the connection the graphical user interface
is given to the user, to identify the application. Once
the user identified the application the API (application
protocol interface) will fetch the necessary data from
the memory. Then depending upon the users, payload
checker will intimate the data required for each pack-
ets to transmit. SDK is used to identify the versions of
each users android versions and adjust the packets for
all the other users. Using transmitter the packets are
transmitted via network protocol UDP. Then accord-
ing the requirement of individual user the packets are
divided using payload divider.
Figure 6 Block Diagram of Proposed System
Then the other clients in the network will receive
the packets instantly with minimum delay. The pro-
posed system uses the concepts of nearby connections
and Wi-Fi direct. Wi-Fi direct is used to provide a
network configuration between devices and nearby
connection is used to share the data or information
through Wi-Fi. The application becomes active once
the hosting person or the user connected to a simple
Wi-Fi network. Different types of processors are used
in smart phones. The processor is used to perform all
the functions of the smart phone.
In order to give the user a friendly and easier inter-
face GUI is used. User selects the application via
graphical user interface (GUI). Searching through the
screen the application can be found. After the user
selected the application a certain protocol will be
turned on in order to start the application which is
known as API (Application Protocol Interface). API
fetches the required data to start the application. Then
the connection between every user to every other user
in the network is done by the application depending
upon their version of androids. This is prepro-
grammed using software development kit where the
connection between the users are developed using
java programming. Once the connection is made then
the payloads can be calculated.
ISSN: 2456 - 3935
International Journal of Advances in Computer and Electronics Engineering
Volume 4, Issue 5, May 2019, pp. 714
www.ijaceeonline.com 11
If the connection is not made then it will exit and
after timeout it will try again to connect into the net-
work. Then depending on the users requirements the
packets of data are divided. To divide the data, Pay-
load divider (also known as demultiplexer). Here sin-
gle input is converted into multiple outputs in order to
transmit to all the users in the network. Once the
packets are divided the transmission of the packet
takes place. A simple transmitting action based on
nearby connection is done i.e., the packets are trans-
mitted using Wi-Fi antenna in the smart phone. In
order to transmit data between layers UDP (User
Datagram Protocol) is used.
4. MATERIALS&METHODS
4.1 Smart Phones
First smartphone is IBMs Simon, smart phone is
used for sending email and faxes. And also used for
calling and messaging. They also have network con-
nection for downloading data. Internet communication
is provided in smart phones which is used to down-
load datas. They are provided with cameras to take
photos such as selfies etc.. Nowadays to improve per-
formance and to improve efficiency snapdragon pro-
cessor is used and soon will be updated based on up-
coming versions. Commonly used versions these days
are lollipop, marshmallow, nougat and Oreo.
4.2 Android 3.3
Android version 3.3 is used to develop applications
nowadays. Programming language used in this plat-
form is JAVA. Java is a programming language used
in front end and back end of SDK tool. SDK stands
for Software Development Kit and it is used to create
software of all kind. The maximum SDK level used
nowadays is 21 and soon to be updated. Using SDK a
certain protocols are called in order to maintain effi-
cient function of the software. In essence of applica-
tion API is called. API stands for Application Proto-
col Interface which is used to fetch the necessary in-
formation from the memory to the application.
4.3 Wi-Fi Modem
The common standards for Wireless Fidelity over
the globe is known as IEEE 802.11.They are different
modes of Wi-Fi are developed for the past years.
Hotspot is one of them which is used in Smart Mobile
Phones to share data's with those who connected in
the network. Maximum members can be connected
through the Hotspot is 16 members. Modem is used
for larger number of participants in the network.
Mostly used large scale industries or corporate com-
panies and also small scale industries with members
more than 100 client or participants are connected in
the network to share data.
Wi-Fi module is used to communicate between two
machines which is also known as IoT (Internet of
Things).Here devices are connected in the Wi-Fi net-
work through which the commands are passed be-
tween them. Hence the operations will be performed
by the devices connected in the network. The cost of
Wi-Fi module is low so most of IoT automated home
appliances using Wi-Fi module. The WIFI access for
this application may be in any form such as a module
or a hotspot from a mobile phone or a MODEM. De-
pending on the type of network the user can be name
as client or admin. If the user produces the WIFI then
he will be admin otherwise he will be considered as a
client.
Figure 7 Wireless Fidelity Module
5. SIMULATION OUTPUT
Android studio is the well-known platform for de-
veloping applications for Android smartphones. One
of the reasons why this platform is used because it can
use multiple programming languages. Most of the
application is created using Android Java and front
end is created using XML. Data base is created using
SQL. The android studio provide user with necessary
information while coding. These information will be
shown in a list where user can pick one for his need.
Figure 8 First Page (Login)
Java is a programming language used to create or
develop software and application all around the world.
ISSN: 2456 - 3935
International Journal of Advances in Computer and Electronics Engineering
Volume 4, Issue 5, May 2019, pp. 714
www.ijaceeonline.com 12
Even though it is a old programming language, due to
its user-friendly interface and frequent updates made
Java, the most commonly used programming Lan-
guage of all time. Java is class based object oriented
programming language. Since Java uses both inter-
preter and compiler the output efficiency gradually
increased. The login type is shown in Figure 8. First
page is used to admin login to the application which is
provided. Admin is logged in after typing the pass-
word. The Password which can updated is shown in
Figure 9.
Figure 9 Second Page (Update)
Figure: 10 Third Page (Name)
Using this update option, the admin can change the
password by typing the current password and the new
password which is to be updated. Group members
who all are needed to login are logged in by a
username which is to be created by themselves.
Figure 11 Fourth Page (Conference)
By clicking the JOIN GROUP ,the members are
joined in the group.By using MICROPHONE option,
we can hear the conference using Headset.By using
LOUDSPEAKER option,we can hear the conference
directly.
Figure 12 Fifth Page (Utility)
The group members are joined in the above fig-
ure.5.5.The maximum members that can be connected
are 200 members. The member who is speaking is
shown in Figure 13.
ISSN: 2456 - 3935
International Journal of Advances in Computer and Electronics Engineering
Volume 4, Issue 5, May 2019, pp. 714
www.ijaceeonline.com 13
Figure 13 Sixth Page (Identity)
After the admin who need to start the conference
will start to talk and group members will be con-
nected. After the admin stopped talking others who
need to talk will click the Start to speak button and
start talking. If any unwanted member to be removed
the admin can do this by using the option which is
provided.
6. CONCLUSION
After examining the papers on experimental inves-
tigation of live audio broadcasting, a new android
application based on wi-fi direct and nearby connec-
tion for establishing live audio conference through wi-
fi (IEEE 802.11) is proposed. This system utilizes and
enhances the performance of wi-fi and also data
sharing. The future enhancements are given below:
Multiple conferences in a same network can be
done. Transmission control protocol can be im-
plemented for better quality of audio. Recording the
conference can be done. Voice notification can be
implemented.
REFERENCES
[1] MrRajendra D. Bhosale, Mr.Atul. R. Nigavekar ”Performance
Evaluation of Unlicensed Mobile Access using WiFi” IE EE-
International Conference on Computing Communication
Control and Automation 2015.
[2] Cisco, “Cisco Visual Networking Index: Global Mo- bile Data
Traffic Forecast Update, 2015V2020,” 2016 ,
https://www.cisco.com/c/dam/m/en
in/innovation/enterprise/assets/mobile- whitepaper-c11-
520862.pdf.
[3] Apple, “Wireless carrier suppo rt a nd features for iPhone over
the world,” 2017, https://support.apple.com/en-us/HT204039.
[4] M. Garcia-Martin, “Input 3rd-Generation Partnership Project
(3GPP) Release 5 Requirements on the Session Initiation
Protocol (SIP),” 2005, https://too ls.ietf.org/html/rfc4083.
[5] R. Jesske, D. Telekom, K. Drage, and C. Holmber g, “Private
Header (P-Header) Extensions to the Session Initiation
Protocol (SIP) for the 3GPP,” 2014,
https://tools.ietf.org/html/rfc7315.
[6] 3GPP, “TS33.401:3GPP System Architecture Evolution
(SAE);Security architecture,” 2017 .
[7] M. Youssef and A. Agrawala, “T he Horus WLAN location
determination system,” in Proceedings of the 3rd International
Conference on Mobile Systems, Applications, and Services
(MobiSys ’05), pp. 205218, ACM, June 2005.
[8] J.-G. Park, B. Charrow, D. Curtis et al., “Growing an o rganic
indoor locatio n system,” inProceedings o f the 8th Annual
International Conference on Mobile Systems, Applicationsand
Services (MobiSys ’10), pp. 271–284, San Francisco, Calif,
USA, June 2010.
[9] M. Azizyan, I. Constandache, and R. R. Choudhury,
“SurroundSense: mobile phone localization via ambience
fingerprinting,”in Proceedings of the 15th Annual ACM
International Conference on Mobile Computing and
Networking (MobiCom ’09), pp. 261272, ACM, September
2009.
[10] K. Fall, delay-tolerant network architecture for
challengedinternets,” in Proc. of ACM SIGCOMM 2003, pp.
2734
[11] R. Es-sadaoui, L. Azergui, M. Guermoud, J. Khallaayoune, S.
Bouaazzaoui, T. Brizard, IoT Embedded System
Communications for Wireless Underwater Depth and
Temperature Monitoring”, International Journal of Advances
in Computer and Electronics Engineering, Vol. 2, No. 7, pp.
21-28, July 2017.
Authors Biography
Dr. Sivakumar Sabapa-
thy Arumugam has a B.E.,
degree in ECE and M.E.,
degree in VLSI Design &
Doctorate degree in VLSI
Design. He is working as
Assistant Professor at Info
Institute of Engineering
Coimbatore, India. His
areas of interests are VLSI
design and embedded sys-
tems. Dinesh Rengasamy is pur-
suing B.E., degree in ECE
at Info Institute of Engi-
neering Coimbatore, India.
His areas of interests are
networking and embedded
systems.
Karthikeyan Ganesan is
pursuing B.E., degree in
ECE at Info Institute of
Engineering Coimbatore,
India. His areas of interests
are networking and embed-
ded systems.
ISSN: 2456 - 3935
International Journal of Advances in Computer and Electronics Engineering
Volume 4, Issue 5, May 2019, pp. 714
www.ijaceeonline.com 14
Kirthika Iyappan is pur-
suing B.E., degree in ECE
at Info Institute of Engi-
neering Coimbatore, India.
Her areas of interests are
networking and embedded
systems.
Kiruthika Sundharamoo-
rthi is pursuing B.E.,
degree in ECE at Info
Institute of Engineering,
Coimbatore- India. Her
areas of interests are
networking and embedded
systems.
Cite this paper:
Sivakumar Sabapathy Arumugam, Dinesh Rengasamy,
karthikeyan Ganesan, Kirthika Iyappan, kiruthika
Sundharamoorthi, Android application for audio conference
using IEEE 802.11”, International Journal of Advances in
Computer and Electronics Engineering, Vol. 4, No. 5, pp. 7-
14, May 2019.
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
This paper presents an embedded wireless Internet of Things architecture, integrating real time embedded systems that communicate underwater through acoustic signals. The proposed architecture is based on an ultra-low-power Flash Micro-controller that manages communications with sensors, and synchronization between the whole system through wireless radio link. The developed system was tested with water depth and temperature sensors monitoring. Sensed data is gathered to the main station by means of wireless acoustic pulses, sent by transmitters through water. The transmitter and the receiver acoustic chains are based on a Digital Signal Processor. The receiver acoustic board is connected to a local server implemented on a RaspberryPI unit.
Conference Paper
Full-text available
Most current methods for 802.11-based indoor localization depend on surveys conducted by experts or skilled technicians. Some recent systems have incorporated surveying by users. Structuring localization systems "organically," however, introduces its own set of challenges: conveying uncertainty, determining when user input is actually required, and discounting erroneous and stale data. Through deployment of an organic location system in our nine-story building, which contains nearly 1,400 distinct spaces, we evaluate new algorithms for addressing these challenges. We describe the use of Voronoi regions for conveying uncertainty and reasoning about gaps in coverage, and a clustering method for identifying potentially erroneous user data. Our algorithms facilitate rapid coverage while maintaining positioning accuracy comparable to that achievable with survey-driven indoor deployments.
Conference Paper
Full-text available
We present the design and implementation of the Horus WLAN location determination system. The design of the Horus system aims at satisfying two goals: high accuracy and low computational requirements. The Horus system identifies different causes for the wireless channel variations and addresses them to achieve its high accuracy. It uses location-clustering techniques to reduce the computational requirements of the algorithm. The lightweight Horus algorithm helps in supporting a larger number of users by running the algorithm at the clients.We discuss the different components of the Horus system and its implementation under two different operating systems and evaluate the performance of the Horus system on two testbeds. Our results show that the Horus system achieves its goal. It has an error of less than 0.6 meter on the average and its computational requirements are more than an order of magnitude better than other WLAN location determination systems. Moreover, the techniques developed in the context of the Horus system are general and can be applied to other WLAN location determination systems to enhance their accuracy. We also report lessons learned from experimenting with the Horus system and provide directions for future work.
Conference Paper
Full-text available
A growing number of mobile computing applications are cen- tered around the user's location. The notion of location is broad, ranging from physical coordinates (latitude/longitude) to logical labels (like Starbucks, McDonalds). While extensive research has been performed in physical localization, there have been few attempts in recognizing logical locations. This paper argues that the increasing number of sensors on mo- bile phones presents new opportunities for logical localiza- tion. We postulate that ambient sound, light, and color in a place convey a photo-acoustic signature that can be sensed by the phone's camera and microphone. In-built accelerometers in some phones may also be useful in inferring broad classes of user-motion, often dictated by the nature of the place. By combining these optical, acoustic, and motion attributes, it may be feasible to construct an identifiable fingerprint for logical localization. Hence, users in adjacent stores can be separated logically, even when their physical positions are ex- tremely close. We propose SurroundSense, a mobile phone based system that explores logical localization via ambience fingerprinting. Evaluation results from 51 different stores show that SurroundSense can achieve an average accuracy of 87% when all sensing modalities are employed. We be- lieve this is an encouraging result, opening new possibilities in indoor localization.
Conference Paper
Internet protocol (IP) telephony is sensible in the view of providing platform for faster information exchange using voice calls and its demand is increasing. IP telephony in heterogeneous network environments can prove its dominating characteristics over circuit switched network. General packet radio service (GPRS) is mostly used network in India. Interface, using serving GPRS support node (SGSN) gateway for IP telephony, to provide channel to all users using wireless local area network (WLAN) to make voice calls to GPRS mobile user, can provide ultimate solution for the need of cheaper and flexible calling in the areas where service provider's coverage range is quite poor. Interconnecting WiFi and GPRS as mentioned in unlicensed mobile access (UMA) can provide more reliable and single device multi interface platform and add more flexibility to its users having handsets with dual radio interface capability. The performance evaluation has been done for UMA using network simulator. Analysis indicates that the system can perform better with less end to end delay, jitter, packet loss and optimum throughput.
Wireless carrier support and features for iPhone over the world
  • Apple
Apple, "Wireless carrier support and features for iPhone over the world," 2017, https://support.apple.com/en-us/HT204039.
Input 3rd-Generation Partnership Project (3GPP) Release 5 Requirements on the Session Initiation Protocol (SIP)
  • M Garcia-Martin
M. Garcia-Martin, "Input 3rd-Generation Partnership Project (3GPP) Release 5 Requirements on the Session Initiation Protocol (SIP)," 2005, https://tools.ietf.org/html/rfc4083.
Private Header (P-Header) Extensions to the Session Initiation Protocol (SIP) for the 3GPP
  • R Jesske
  • D Telekom
  • K Drage
  • C Holmberg
R. Jesske, D. Telekom, K. Drage, and C. Holmberg, "Private Header (P-Header) Extensions to the Session Initiation Protocol (SIP) for the 3GPP," 2014, https://tools.ietf.org/html/rfc7315.
TS33.401:3GPP System Architecture Evolution (SAE);Security architecture
3GPP, "TS33.401:3GPP System Architecture Evolution (SAE);Security architecture," 2017.