• Title/Summary/Keyword: mobility, connectivity

Search Result 132, Processing Time 0.022 seconds

ST Reliability and Connectivity of VANETs for Different Mobility Environments

  • Saajid, Hussain;DI, WU;Memon, Sheeba;Bux, Naadiya Khuda
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2338-2356
    • /
    • 2019
  • Vehicular ad-hoc network (VANET) is the name of technology, which uses 'mobile internet' to facilitate communication between vehicles. The aim is to ensure road safety and achieve secure communication. Therefore, the reliability of this type of networks is a serious concern. The reliability of VANET is dependent upon proper communication between vehicles within a given amount of time. Therefore a new formula is introduced, the terms of the new formula correspond 1 by 1 to a class special ST route (SRORT). The new formula terms are much lesser than the Inclusion-Exclusion principle. An algorithm for the Source-to-Terminal reliability was presented, the algorithm produced Source-to-Terminal reliability or computed a Source-to-Terminal reliability expression by calculating a class of special networks of the given network. Since the architecture of this class of networks which need to be computed was comparatively trivial, the performance of the new algorithm was superior to the Inclusion-Exclusion principle. Also, we introduce a mobility metric called universal speed factor (USF) which is the extension of the existing speed factor, that suppose same speed of all vehicles at every time. The USF describes an exact relation between the relative speed of consecutive vehicles and the headway distance. The connectivity of vehicles in different mobile situations is analyzed using USF i.e., slow mobility connectivity, static connectivity, and high mobility connectivity. It is observed that $p_c$ probability of connectivity is directly proportional to the mean speed ${\mu}_{\nu}$ till specified threshold ${\mu}_{\tau}$, and decreases after ${\mu}_{\tau}$. Finally, the congested network is connected strongly as compared to the sparse network as shown in the simulation results.

Connectivity and Mobility: Two Dimensions in Tapping the Opportunities for Mobile Business

  • Park, Chul-Woo;Yang, Hee-Dong;Ahn, Joong-Ho
    • Proceedings of the CALSEC Conference
    • /
    • 2004.02a
    • /
    • pp.355-377
    • /
    • 2004
  • Mobile business, noticed as a constructive alternative for e-commerce and e-business, has been diversely defined and conceptualized. This study develops a comprehensive framework for the sake of clearing such a havoc of conceptual deluge. The framework for the comprehensive understanding of e-business (including m-business) consists of two dimensions: connectivity and mobility. These two dimensions represent to overcome the constraints of time and place in business transactions, respectively. Various cases for each combination of these two components are explained for clear understanding of this framework. By this framework, we can understand the value that Location-Based Service (LBS) brings anew to e-business services.

  • PDF

Developing a Mobile-Business Framework Considering Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경을 고려한 모바일 비즈니스 프레임워크 개발)

  • Park, Chul-Woo;Yang, Hee-Dong;Ahn, Joong-Ho
    • Information Systems Review
    • /
    • v.5 no.2
    • /
    • pp.37-51
    • /
    • 2003
  • Mobile business noticed as a constructive alternative of e-commerce and e-business is being diversely considered as a new form or subset of e-business. In this study, mobile business is defined as a comprehensive alternative including e-business. The framework of the superset of e-business has two axes: connectivity and mobility. In addition, various cases based on the combination of the components are provided and explained. It is the main characteristic of this study that the element of off-line "mobility" is added to "connectivity" generally used while explaining e-commerce and e-business. For place (or location) is a prerequisite for the feature of mobility, we grope for why and how Location-Based Service (LBS) will take an important role in the development of new e-business models and services. As the real and full-scale beginning of IMT-2000 service and the rapid progress and diffusion of mobile communications services including wireless LAN require an immense and innovative way of thinking about e-commerce and e-business, the framework suggested in this study is considered to go far toward satisfying the new needs in this area.

Relay Node Selection Method using Node-to-node Connectivity and Masking Operation in Delay Tolerant Networks (DTN에서 노드 간 연결 가능성과 마스킹 연산을 이용한 중계노드 선정 기법)

  • Jeong, Rae-jin;Jeon, Il-Kyu;Woo, Byeong-hun;Koo, Nam-kyoung;Lee, Kang-whan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.5
    • /
    • pp.1020-1030
    • /
    • 2016
  • This paper propose an improving relay node selection method for node-to-node connectivity. This concern with the mobility and analysis of deployed for masking operation using highest connectivity node. The major of Delay Tolerant Network (DTN) routing protocols make use of simple forwarding approach to transmit the message depend on the node's mobility. In this cases, the selection of the irrelevant mobile node induced the delay and packet delivery loss caused by limiting buffer size and computational power of node. Also the proposed algorithm provides the node connectivity considering the mobility and direction select the highest connectivity node from neighbor node using masking operation. From the simulation results, the proposed algorithm compared the packet delivery ratio with PROPHET and Epidemic. The proposed Enhanced Prediction-based Context-awareness Matrix(EPCM) algorithm shows an advantage packet delivery ratio even with selecting relay node according to mobility and direction.

Efficient Forwarding Path Computing Method for Context-Awareness Mobility Prediction Model (상황인식 이동성 예측 모델에서의 효율적인 포워딩 경로 산출 기법)

  • Jeong, Rae-jin;Oh, Young-jun;Lee, Kang-whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.93-95
    • /
    • 2014
  • In this paper, we proposed efficient forwarding path computing method using Context-Awareness Mobility Prediction Model. Context-Awareness Mobility Prediction Model is storing and classifying node's previous velocity and direction according to time in the hierarchical cluster structure. To overcome environment which node-to-node connection is broken off easily, the proposed algorithm calculate the connectivity formed matrix structure by comparing predicted velocity and direction, and use masking operation for selecting relay moving to destination. The proposed algorithm identified to show short delay by utilizing forwarding path which is continue node-to-node connection in the unstable situation.

  • PDF

Mobility Prediction Based Autonomous Data Link Connectivity Maintenance Using Unmanned Vehicles in a Tactical Mobile Ad-Hoc Network (전술 모바일 애드혹 네트워크에서 무인기를 이용하는 이동 예측 기반의 데이터 링크 연결 유지 알고리즘)

  • Le, Duc Van;Yoon, Seokhoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.1
    • /
    • pp.34-45
    • /
    • 2013
  • Due to its self-configuring nature, the tactical mobile ad hoc network is used for communications between tactical units and the command and control center (CCC) in battlefields, where communication infrastructure is not available. However, when a tactical unit moves far away from the CCC or there are geographical constraints, the data link between two communicating nodes can be broken, which results in an invalid data route from the tactical units to CCC. In order to address this problem, in this paper we propose a hierarchical connectivity maintenance scheme, namely ADLCoM (Autonomous Data Link Connectivity Maintenance). In ADLCoM, each tactical unit has one or more GW (gateway), which checks the status of data links between tactical units. If there is a possibility of link breakage, GWs request ground or aerial unmanned vehicles to become a relay for the data link. The simulation results, based on tactical scenarios, show that the proposed scheme can significantly improve the network performance with respect to data delivery ratio.

Dynamic Reverse Route for On-Demand Routing Protocol in MANET

  • Zuhairi, Megat;Zafar, Haseeb;Harle, David
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.5
    • /
    • pp.1354-1372
    • /
    • 2012
  • Route establishment in Mobile Ad Hoc Network (MANET) is the key mechanism to a successful connection between a pair of source and destination nodes. An efficient routing protocol constructs routing path with minimal time, less routing overhead and capable of utilizing all possible link connectivity. In general, most on-demand MANET routing protocols operates over symmetrical and bidirectional routing path, which is infeasible due to the inherent heterogeneous properties of wireless devices. Simulation results show that the presence of unidirectional links on a network severely affect the performance of a routing protocol. In this paper, a robust protocol independent scheme is proposed, which enable immediate rediscovery of alternative route for a path blocked by a unidirectional link. The proposed scheme is efficient; route rediscovery is locally computed, which results in significant minimization of multiple route packets flooding. Nodes may exploit route information of immediate neighbors using the local reply broadcast technique, which then redirect the control packets around the unidirectional links, therefore maintaining the end-to-end bidirectional connection. The proposed scheme along with Ad Hoc On-demand Distance Vector (AODV) and AODV-Blacklist routing protocol is investigated over three types of mobility models. Simulation results show that the proposed scheme is extremely reliable under poor network conditions and the route connectivity can be improved by as much as 75%.

A Study on HLR technology in the IMT-2000 (IMT-2000의 HLR(Home Location Register)에 관한 연구)

  • 박태진;이상준
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.3
    • /
    • pp.99-108
    • /
    • 2002
  • Users location management and handoff management is constructed more effective for giving satisfaction to QoS of multimedia service in Mobility network. For this, We have the HLR of IMT-2000, difference of the HLR of PCS, and connectivity Artificial Intelligent network and to provide data service of packet that is analyze to effect on the HLR. We have a study on effective for satisfaction of QoS, that is the VHE of full concepts for provide of service in the IMT-2000, packet data service for internet connectivity, for satisfaction of QoS on basis mobility network technologies of the 2nd generation.

  • PDF

An Analysis of the Research Trend on Smart Mobility : Topic Modeling Approach (스마트 모빌리티 연구 동향에 관한 분석 : 토픽 모델링의 적용)

  • Park, Jungtae;Kim, Choongyoung;Kim, Taejong
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.2
    • /
    • pp.85-100
    • /
    • 2022
  • Recently, with the widespread expansion of convergence based on digital connectivity, the transportation and mobility fields are rapidly changing, and research related to this is also diversifying. This study aims to analyze the research trends in the mobility field and identify key research areas and topics. Topic modeling analysis has been proved as a useful approach for analyzing the research trends. The abstracts of 142 research papers concerning mobility from the Korean academic citation index were analyzed, derived 9 research topics and linked to 6 key elements of research framework. The result showed that 'Advanced vehicle and transportaion technology' and 'Linkage and integrated services among means for mobility' were most actively studied research fields. It also found that research on insurance, law, regulation for securing user's safety and conflict-resolving with the existing industry has been conducted.

Secure Pre-authentication Schemes for Fast Handoff in Proxy Mobile IPv6

  • Baek, Jaejong
    • Journal of information and communication convergence engineering
    • /
    • v.14 no.2
    • /
    • pp.89-96
    • /
    • 2016
  • In mobile communication, there are various types of handoff for the support of all forms of mobility. Proxy mobile IPv6 (PMIPv6) enables local network-based mobility management of a mobile node without any effect of mobility-related signaling. Recently, PMIPv6 has been considered for supporting mobility management in LTE/SAE-based mobile networks. To support seamless mobility in heterogeneous mobile networks, the overall cost of handoffs needs to be minimized and the procedure should be guaranteed to be secure. However, the reduction of the authentication cost has not been fully investigated to provide seamless connectivity when mobile users perform a handoff between the PMIPv6 domains. This paper proposes secure pre-authentication schemes, completing an authentication procedure before performing a handoff, for a fast handoff in PMIPv6. Analytic models have been used for measuring the authentication latency and for the overhead cost analysis. In addition to providing fast authentication, the proposed pre-authentication schemes can prevent threats such as replay attacks and key exposure.