• Title/Summary/Keyword: Internet Connectivity

Search Result 343, Processing Time 0.027 seconds

CCAJS: A Novel Connect Coverage Algorithm Based on Joint Sensing Model for Wireless Sensor Networks

  • Sun, Zeyu;Yun, Yali;Song, Houbing;Wang, Huihui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.5014-5034
    • /
    • 2016
  • This paper discusses how to effectively guarantee the coverage and connectivity quality of wireless sensor networks when joint perception model is used for the nodes whose communication ranges are multi-level adjustable in the absence of position information. A Connect Coverage Algorithm Based on Joint Sensing model (CCAJS) is proposed, with which least working nodes are chosen based on probability model ensuring the coverage quality of the network. The algorithm can balance the position distribution of selected working nodes as far as possible, as well as reduce the overall energy consumption of the whole network. The simulation results show that, less working nodes are needed to ensure the coverage quality of networks using joint perception model than using the binary perception model. CCAJS can not only satisfy expected coverage quality and connectivity, but also decrease the energy consumption, thereby prolonging the network lifetime.

A Study on the Effect of Satisfaction with R&D Projects on R&D Performance Satisfaction -For SMEs in Jeollanamdo-

  • Choi, Hong Wan;Kang, Min Jung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.11-19
    • /
    • 2021
  • The purpose of this study is to check whether the satisfaction of the R&D (Research & Development) project directly affects the R&D performance, and to find out whether the satisfaction with regional connectivity and the satisfaction with the R&D operation management significantly mediate the relationship that the satisfaction with the R&D project has on the R&D performance. In order to verify the research hypothesis on this, a total of 51 companies located in Jeollanam-do that actually conducted R&D research projects were surveyed and analyzed. In order to conduct an empirical study based on the collected questionnaire, a survey questionnaire related to the variables of the study model was composed based on a sample of 51 questionnaires. We used the SPSS program to verify the hypotheses in this study, and the hypotheses were verified by analyzing the validity, reliability, correlation, and deflection. As a result, there was a positive (+) significant relationship between R&D project satisfaction and R&D performance. In addition, it was found that the relationship between R&D project satisfaction and R&D performance was significantly mediated by the satisfaction with R&D regional connectivity and satisfaction with R&D project operation management.

Business Model Framework for IoT: Case Studies and Strategic Implications for IoT Businesses

  • Kim, Dongwook;Kim, Sungbum;Lee, Junghwan
    • Journal of Information Technology Applications and Management
    • /
    • v.29 no.1
    • /
    • pp.1-28
    • /
    • 2022
  • To realize the vision of internet of things (IoT), where it is expected to bring significant impact to the global economy in the future, consideration of business models in the IoT context is necessary. This research attempts to build an enhanced artifact business model framework based on the definitions of IoT and literature on business models for analysis of IoT businesses. The framework is used to analyze four different types of players: the owner of things, vendors of devices, providers of connectivity and providers of IoT application services. The findings suggest that the owners of things tend to partner with ICT players to complement their weakness, and it tends to be connectivity providers. The device vendors leverage their strength of devices and device platforms to attract and enable 3rd party sensor/devices to interconnect, while the service providers are aiming to penetrate into customer premise. These lead to the following recommendations for non-IT players to consider in expanding into IoT business: 1) take into account differences in product development process between IT and non-IT businesses in expanding into IoT market; 2) collaborate with ICT players that acknowledge and understand the differences.

A Study on the Influences of Network Features on the Diffusion of Internet Fashion Information (인터넷 패션정보 확산에서 네트워크 특성의 영향에 관한 연구)

  • Song, Ki Eun;Hwang, Sun Jin
    • Journal of the Korean Society of Costume
    • /
    • v.63 no.2
    • /
    • pp.1-13
    • /
    • 2013
  • The purpose of this study is to examine how the features of network in the Internet fashion community affect the diffusion of fashion information to members in the online community with other variables (informative features, consumer features). Communities that actively exchange fashion information among their members were selected for the social network analysis and hypothesis verification. As a result, we found that a few information activists influenced most of the information receivers in the network features of fashion communities. Also, we found that the informative features (usefulness, reliability), consumer features (NFC, innovation) as well as the network features (connectivity, power), have a significant influence on the diffusion of Internet fashion information which verified the importance of the network features in the study on the Internet.

Survivability in the Optical Internet Using the Optical Burst Switch

  • Oh, Seung-Hun;Kim, Young-Han;Yoo, Myung-Sik;Hong, Hyun-Ha
    • ETRI Journal
    • /
    • v.24 no.2
    • /
    • pp.117-130
    • /
    • 2002
  • Due to its salient features, the optical burst switch is becoming a key technology for the optical Internet. Within this technology, the survivability issue in the optical Internet has to be addressed because a simple failure causes severe damage to the huge amount of data carried in optical fiber. In this paper, we introduce a restoration procedure that can provide good survivability in the optical burst switch (OBS)-based optical Internet. OBS restoration can survive various types of network failure while maintaining good network performance. We propose novel restoration mechanisms, namely, "temporary Label Switched Path (LSP)" and "bossy LSP," to enhance restoration time and network utilization. The simulation results verify that the proposed OBS restoration achieves good network performance and provides good network connectivity as well.

  • PDF

Efficient Power-Saving 10-Gb/s ONU Using Uplink Usage-Dependent Sleep Mode Control Algorithm in WDM-PON

  • Lee, Han Hyub;Kim, Kwangok;Lee, Jonghyun;Lee, Sangsoo
    • ETRI Journal
    • /
    • v.35 no.2
    • /
    • pp.253-258
    • /
    • 2013
  • We propose and demonstrate an efficient power-saving optical network unit (ONU) based on upstream traffic monitoring for 10-Gb/s wavelength division multiplexed passive optical networks (WDM-PONs). The power-saving mode controller uses a ${\mu}$-processor and traffic monitoring modules followed by the proposed power-saving processes to operate the sleep mode ONU. The power consumption of the ONU is effectively reduced from 19.3 W to 6.4 W when no traffic from the users is detected. In addition, we design a power-saving mechanism based on a cyclic sleep mode operation to allow a connectivity check between the optical line terminal and ONU. Our calculation results show that the WDM-PON ONU reduces the power consumption by around 60% using the proposed mechanism.

A Survey on Trust Computation in the Internet of Things

  • Truong, Nguyen B.;Jayasinghe, Upul;Um, Tai-Won;Lee, Gyu Myoung
    • Information and Communications Magazine
    • /
    • v.33 no.2
    • /
    • pp.10-27
    • /
    • 2016
  • Internet of Things defines a large number of diverse entities and services which interconnect with each other and individually or cooperatively operate depending on context, conditions and environments, produce a huge personal and sensitive data. In this scenario, the satisfaction of privacy, security and trust objectives plays a critical role in the success of the Internet of Things. Trust here can be considered as a key property to establish trustworthy and seamless connectivity among entities and to guarantee secure services and applications. The aim of this study is to provide a survey on various trust computation strategies and identify future trends in the field. We discuss trust computation methods under several aspects and provide comparison of the approaches based on trust features, performance, advantages, weaknesses and limitations of each strategy. Finally the research discuss on the gap of the trust literature and raise some research directions in trust computation in the Internet of Things.

A Tree-Based Approach for the Internet Connectivity of Mobile Ad Hoc Networks

  • Oh, Ro-An
    • Journal of Communications and Networks
    • /
    • v.11 no.3
    • /
    • pp.261-270
    • /
    • 2009
  • We propose a tree-based integration of infrastructure networks and MANETs (TUM) to efficiently extend the scope of mobile Internet protocol to mobile ad hoc networks and devise a tree-based routing protocol (TBRP) that is suitable for the TUM architecture. Infrastructure networks have a number of fixed Internet Gateways that connect two heterogeneous networks. Mobile nodes form a number of small trees named pMANETs, each of them growing from anchor node which can communicate directly with an Internet Gateway. A new node registers with foreign agent and home agent along the tree path without resorting to an inefficient flooding. Furthermore, the TBRP sets up a routing path efficiently by exploiting the tree information without relying on flooding. We show by resorting to simulation that our approach is competitive against the conventional AODV based approach.

Ontology Based-Security Issues for Internet of Thing (IoT): Ontology Development

  • Amir Mohamed Talib
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.168-176
    • /
    • 2023
  • The use of sensors and actuators as a form of controlling cyber-physical systems in resource networks has been integrated and referred to as the Internet of Things (IoT). However, the connectivity of many stand-alone IoT systems through the Internet introduces numerous security challenges as sensitive information is prone to be exposed to malicious users. In this paper, IoT based-security issues ontology is proposed to collect, examine, analyze, prepare, acquire and preserve evidence of IoT security issues challenges. Ontology development has consists three main steps, 1) domain, purpose and scope setting, 2) important terms acquisition, classes and class hierarchy conceptualization and 3) instances creation. Ontology congruent to this paper is method that will help to better understanding and defining terms of IoT based-security issue ontology. Our proposed IoT based-security issue ontology resulting from the protégé has a total of 44 classes and 43 subclasses.

Artificial neural network for safety information dissemination in vehicle-to-internet networks

  • Ramesh B. Koti;Mahabaleshwar S. Kakkasageri;Rajani S. Pujar
    • ETRI Journal
    • /
    • v.45 no.6
    • /
    • pp.1065-1078
    • /
    • 2023
  • In vehicular networks, diverse safety information can be shared among vehicles through internet connections. In vehicle-to-internet communications, vehicles on the road are wirelessly connected to different cloud networks, thereby accelerating safety information exchange. Onboard sensors acquire traffic-related information, and reliable intermediate nodes and network services, such as navigational facilities, allow to transmit safety information to distant target vehicles and stations. Using vehicle-to-network communications, we minimize delays and achieve high accuracy through consistent connectivity links. Our proposed approach uses intermediate nodes with two-hop separation to forward information. Target vehicle detection and routing of safety information are performed using machine learning algorithms. Compared with existing vehicle-to-internet solutions, our approach provides substantial improvements by reducing latency, packet drop, and overhead.