• Title/Summary/Keyword: Heterogeneous Wireless Network

Search Result 285, Processing Time 0.024 seconds

Dynamic Service Composition and Development Using Heterogeneous IoT Systems

  • Ryu, Minwoo;Yun, Jaeseok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.9
    • /
    • pp.91-97
    • /
    • 2017
  • IoT (Internet of Things) systems are based on heterogeneous hardware systems of different types of devices interconnected each other, ranging from miniaturized and low-power wireless sensor node to cloud servers. These IoT systems composed of heterogeneous hardware utilize data sets collected from a particular set of sensors or control designated actuators when needed using open APIs created through abstraction of devices' resources associated to service applications. However, previously existing IoT services have been usually developed based on vertical platforms, whose sharing and exchange of data is limited within each industry domain, for example, healthcare. Such problem is called 'data silo', and considered one of crucial issues to be solved for the success of establishing IoT ecosystems. Also, IoT services may need to dynamically organize their services according to the change of status of connected devices due to their mobility and dynamic network connectivity. We propose a way of dynamically composing IoT services under the concept of WoT (Web of Things) where heterogeneous devices across different industries are fully integrated into the Web. Our approach allows developers to create IoT services or mash them up in an efficient way using Web objects registered into multiple standardized horizontal IoT platforms where their resources are discoverable and accessible. A Web-based service composition tool is developed to evaluate the practical feasibility of our approach under real-world service development.

Analysis of Authentication Architecture in Integrated WLAN/3G Networks (통합된 WLAN/3G 네트워크의 증명 방법의 분석)

  • Shrestha, Anish Prasad;Han, Kyong-Heon;Cho, Byung-Lok;Han, Seung-Jo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.237-242
    • /
    • 2008
  • A number of wireless technologies have been implemented, but each technology has its limitation in terms of coverage and bandwidth. WLAN and 3G cellular network has emerged to be a complementary platform for wireless data communications. However, the mobility of roaming terminals in heterogeneous networks poses several risks. To maintain secure communications in universal roaming, the effective authentication must be implemented. The focus of this paper is on analysis of authentication architecture involved in integrated WLAN/3G networks.

  • PDF

Analysis of Authentication Architecture in Integrated WLAN/3G Networks (통합된 WLAN/3G 네트워크의 증명 방법의 분석)

  • Shrestha, Anish Prasad;Lee, Sang-Duk;Cho, Byung-Lok;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.6
    • /
    • pp.1016-1021
    • /
    • 2008
  • A number of wireless technologies have been implemented, but each technology has its limitation in terms of coverage and bandwidth. WLAN and 3G cellular network has emerged to be a complementary platform for wireless data communications. However, the mobility of roaming terminals in heterogeneous networks poses several risks. To maintain secure communications in universal roaming, the effective authentication must be implemented. The focus of this paper is on analysis of authentication architecture involved in integrated WLAN/3G networks.

QoS Guaranteed Handover Scheme for Global Roaming in Heterogeneous Proxy Mobile IPv6 Networks (이기종 프록시 이동(모바일) IPv6 네트워크에서 QoS가 보장된 글로벌 로밍 핸:드오버 방식)

  • Go, Kwang-Sub;Kim, Soo-Hyun;Kim, Mi-Sun;Mun, Young-Song
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.1
    • /
    • pp.1-10
    • /
    • 2012
  • Mobility and quality of service (QoS) are becoming the more important issues in wireless communications. The traditional Internet service is expanding into new access media and applications. Since wireless communication services are accompanied by frequent handovers at remote sites, scalable and fast handover has become a prerequisite for ubiquitous communication. In this paper, the differentiated service (Diffserv) model is deployed in heterogeneous proxy mobile IPv6 (PMIPv6) networks to satisfy the QoS guaranteed service and fast handover requirements. The operational procedures for QoS guaranteed global roaming are presented. In addition, QoS management and handover cost evaluation schemes based on a mobile host's movement scope are proposed. This paper analyzes the reduction in handover delay in a network-based localized mobility management framework. We propose and analyze a PMIPv6 optimized with a global mobile access gateway (G-MAG), which is a network-based entity, to further improve the handover performance in terms of handover delay while maintaining minimal signaling overhead in the air interface among converged heterogeneous wireless networks. The handover signaling procedures with host-based MIPv6 are compared with network-based proxy MIPv6 (PMIPv6) and fast PMIPv6 assisted by G-MAG to show how much handover delay reduction can be achieved. Analytical results show that the handover delay is significantly reduced.

Performance Evaluation of Distributed Clustering Protocol under Distance Estimation Error

  • Nguyen, Quoc Kien;Jeon, Taehyun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.1
    • /
    • pp.11-15
    • /
    • 2018
  • The application of Wireless Sensor Networks requires a wise utilization of limited energy resources. Therefore, a wide range of routing protocols with a motivation to prolong the lifetime of a network has been proposed in recent years. Hierarchical clustering based protocols have become an object of a large number of studies that aim to efficiently utilize the limited energy of network components. In this paper, the effect of mismatch in parameter estimation is discussed to evaluate the robustness of a distanced based algorithm called distributed clustering protocol in homogeneous and heterogeneous environment. For quantitative analysis, performance simulations for this protocol are carried out in terms of the network lifetime which is the main criteria of efficiency for the energy limited system.

Cross-Layer Architecture for QoS Provisioning in Wireless Multimedia Sensor Networks

  • Farooq, Muhammad Omer;St-Hilaire, Marc;Kunz, Thomas
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.178-202
    • /
    • 2012
  • In this paper, we first survey cross-layer architectures for Wireless Sensor Networks (WSNs) and Wireless Multimedia Sensor Networks (WMSNs). Afterwards, we propose a novel cross-layer architecture for QoS provisioning in clustered and multi-hop based WMSNs. The proposed architecture provides support for multiple network-based applications on a single sensor node. For supporting multiple applications on a single node, an area in memory is reserved where each application can store its network protocols settings. Furthermore, the proposed cross-layer architecture supports heterogeneous flows by classifying WMSN traffic into six traffic classes. The architecture incorporates a service differentiation module for QoS provisioning in WMSNs. The service differentiation module defines the forwarding behavior corresponding to each traffic class. The forwarding behavior is primarily determined by the priority of the traffic class, moreover the service differentiation module allocates bandwidth to each traffic class with goals to maximize network utilization and avoid starvation of low priority flows. The proposal incorporates the congestion detection and control algorithm. Upon detection of congestion, the congested node makes an estimate of the data rate that should be used by the node itself and its one-hop away upstream nodes. While estimating the data rate, the congested node considers the characteristics of different traffic classes along with their total bandwidth usage. The architecture uses a shared database to enable cross-layer interactions. Application's network protocol settings and the interaction with the shared database is done through a cross-layer optimization middleware.

TCP-RLDM : Receiver-oriented Congestion Control by Differentiation for Congestion and Wireless Losses (TCP-RLDM: Congestion losses과 Wireless losses 구별을 통한 수신측 기반 혼잡제어 방안)

  • 노경택;이기영
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.4
    • /
    • pp.127-132
    • /
    • 2002
  • This paper aims to adjust the window size according to the network condition that the sender determines by making the receiver participating in the congestion levels. TCP-RLDM has the measurement-based transmission strategy based on the data-receiving rate complementing TCP with the property of Additive Increase / Multiplicative Decrease. The protocol can make an performance improvement by responding differently according to the property of errors-whether congestion losses or transient transmission errors - to confront dynamically in heterogeneous environments with wired or wireless networks and delay-sensitive or -tolerant applications. By collecting data-receiving rate and the cause of errors from the receiver and by enabling sender to use the congestion avoidance strategy before occuring congestion possibly, the protocol works well at variable network environments.

  • PDF

Interference Management Algorithm Based on Coalitional Game for Energy-Harvesting Small Cells

  • Chen, Jiamin;Zhu, Qi;Zhao, Su
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4220-4241
    • /
    • 2017
  • For the downlink energy-harvesting small cell network, this paper proposes an interference management algorithm based on distributed coalitional game. The cooperative interference management problem of the energy-harvesting small cells is modeled as a coalitional game with transfer utility. Based on the energy harvesting strategy of the small cells, the time sharing mode of the small cells in the same coalition is determined, and an optimization model is constructed to maximize the total system rate of the energy-harvesting small cells. Using the distributed algorithm for coalition formation proposed in this paper, the stable coalition structure, optimal time sharing strategy and optimal power distribution are found to maximize the total utility of the small cell system. The performance of the proposed algorithm is discussed and analyzed finally, and it is proved that this algorithm can converge to a stable coalition structure with reasonable complexity. The simulations show that the total system rate of the proposed algorithm is superior to that of the non-cooperative algorithm in the case of dense deployment of small cells, and the proposed algorithm can converge quickly.

Self-Identification of Boundary's Nodes in Wireless Sensor Networks

  • Moustafa, Kouider Elouahed;Hafid, Haffaf
    • Journal of Information Processing Systems
    • /
    • v.13 no.1
    • /
    • pp.128-140
    • /
    • 2017
  • The wireless sensor networks (WSNs) became a very essential tool in borders and military zones surveillance, for this reason specific applications have been developed. Surveillance is usually accomplished through the deployment of nodes in a random way providing heterogeneous topologies. However, the process of the identification of all nodes located on the network's outer edge is very long and energy-consuming. Before any other activities on such sensitive networks, we have to identify the border nodes by means of specific algorithms. In this paper, a solution is proposed to solve the problem of energy and time consumption in detecting border nodes by means of node selection. This mechanism is designed with several starter nodes in order to reduce time, number of exchanged packets and then, energy consumption. This method consists of three phases: the first one is to detect triggers which serve to start the mechanism of boundary nodes (BNs) detection, the second is to detect the whole border, and the third is to exclude each BN from the routing tables of all its neighbors so that it cannot be used for the routing.

QoE-aware Energy Efficiency Maximization Based Joint User Access Selection and Power Allocation for Heterogeneous Network

  • Ji, Shiyu;Tang, Liangrui;Xu, Chen;Du, Shimo;Zhu, Jiajia;Hu, Hailin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.10
    • /
    • pp.4680-4697
    • /
    • 2017
  • In future, since the user experience plays a more and more important role in the development of today's communication systems, quality of experience (QoE) becomes a widely used metric, which reflects the subjective experience of end users for wireless service. In addition, the energy efficiency is an increasingly important problem with the explosive growth in the amount of wireless terminals and nodes. Hence, a QoE-aware energy efficiency maximization based joint user access selection and power allocation approach is proposed to solve the problem. We transform the joint allocation process to an optimization of energy efficiency by establishing an energy efficiency model, and then the optimization problem is solved by chaotic clone immune algorithm (CCIA). Numerical simulation results indicate that the proposed algorithm can efficiently and reliably improve the QoE and ensure high energy efficiency of networks.