• Title/Summary/Keyword: networking of networks

Search Result 815, Processing Time 0.026 seconds

An Efficient Markov Chain Based Channel Model for 6G Enabled Massive Internet of Things

  • Yang, Wei;Jing, Xiaojun;Huang, Hai;Zhu, Chunsheng;Jiang, Qiaojie;Xie, Dongliang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.11
    • /
    • pp.4203-4223
    • /
    • 2021
  • Accelerated by the Internet of Things (IoT), the need for further technical innovations and developments within wireless communications beyond the fifth generation (B5G) networks is up-and-coming in the past few years. High altitude platform station (HAPS) communication is expected to achieve such high levels that, with high data transfer rates and low latency, millions of devices and applications can work seamlessly. The HAPS has emerged as an indispensable component of next-generations of wireless networks, which will therefore play an important role in promoting massive IoT interconnectivity with 6G. The performance of communication and key technology mainly depend on the characteristic of channel, thus we propose an efficient Markov chain based channel model, then analyze the HAPS communication system's uplink capability and swing effect through experiments. According to the simulation results, the efficacy of the proposed scheme is proven to meet the requirements of ubiquitous connectivity in future IoT enabled by 6G.

Optimization of 3G Mobile Network Design Using a Hybrid Search Strategy

  • Wu Yufei;Pierre Samuel
    • Journal of Communications and Networks
    • /
    • v.7 no.4
    • /
    • pp.471-477
    • /
    • 2005
  • This paper proposes an efficient constraint-based optimization model for the design of 3G mobile networks, such as universal mobile telecommunications system (UMTS). The model concerns about finding a set of sites for locating radio network controllers (RNCs) from a set of pre-defined candidate sites, and at the same time optimally assigning node Bs to the selected RNCs. All these choices must satisfy a set of constraints and optimize an objective function. This problem is NP-hard and consequently cannot be practically solved by exact methods for real size networks. Thus, this paper proposes a hybrid search strategy for tackling this complex and combinatorial optimization problem. The proposed hybrid search strategy is composed of three phases: A constraint satisfaction method with an embedded problem-specific goal which guides the search for a good initial solution, an optimization phase using local search algorithms, such as tabu algorithm, and a post­optimization phase to improve solutions from the second phase by using a constraint optimization procedure. Computational results show that the proposed search strategy and the model are highly efficient. Optimal solutions are always obtained for small or medium sized problems. For large sized problems, the final results are on average within $5.77\%$ to $7.48\%$ of the lower bounds.

Fast Recovery Routing Algorithm for Software Defined Network based Operationally Responsive Space Satellite Networks

  • Jiang, Lei;Feng, Jing;Shen, Ye;Xiong, Xinli
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.2936-2951
    • /
    • 2016
  • An emerging satellite technology, Operationally Responsive Space (ORS) is expected to provide a fast and flexible solution for emergency response, such as target tracking, dense earth observation, communicate relaying and so on. To realize large distance transmission, we propose the use of available relay satellites as relay nodes. Accordingly, we apply software defined network (SDN) technology to ORS networks. We additionally propose a satellite network architecture refered to as the SDN-based ORS-Satellite (Sat) networking scheme (SDOS). To overcome the issures of node failures and dynamic topology changes of satellite networks, we combine centralized and distributed routing mechanisms and propose a fast recovery routing algorithm (FRA) for SDOS. In this routing method, we use centralized routing as the base mode.The distributed opportunistic routing starts when node failures or congestion occur. The performance of the proposed routing method was validated through extensive computer simulations.The results demonstrate that the method is effective in terms of resoving low end-to-end delay, jitter and packet drops.

Networking Technologies for IPTV2.0 Service (IPTV2.0 서비스를 위한 네트워킹 기술)

  • Lee, Kyounghee;Yoon, Changwoo;Ryu, Won;Kim, Bongtae
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.3 no.4
    • /
    • pp.218-228
    • /
    • 2008
  • The convergence of broadcasting and telecommunication services is being accelerated by broadband networks, digital broadcasting and Web2.0. This paper describes the definition and service characteristics of IPTV as a representative of broadcasting and telecommunication convergence services. Especially, the changes of infrastructure and technology for IPTV2.0 are addressed in terms of the service features of mobility, intelligence and participation. IPTV2.0 shall be characterized by the open IPTV service based on Web2.0 and the mobile IPTV service over the heterogeneous networks employing various wireless/wired access technologies. The IP Multimedia Subsystem (IMS) and Service Delivery Platform (SDP) technologies are increasingly considered to support the personalization and openness. The mobility management technology is being evolved to provide QoS-guaranteed mobile communication services to users at anytime and anywhere. IPTV2.0 services and platforms are also anticipated to be core components to achieve knowledge-based ubiquitous society. IPTV2.0 contents are required to be integrated with the enhanced metadata to efficiently support search, selection, convergence and delivery of the contents. Moreover, those contents shall be enhanced to provide the scalable services which is adaptable to the network status and user preferences. Therefore, the networking technologies for IPTV2.0 should tightly cooperate with application services and adaptive contents. Those technologies will be developed to construct the ubiquitous content service platform considering the evolution of networks and various converged services.

  • PDF

A Lightweight Software-Defined Routing Scheme for 5G URLLC in Bottleneck Networks

  • Math, Sa;Tam, Prohim;Kim, Seokhoon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.2
    • /
    • pp.1-7
    • /
    • 2022
  • Machine learning (ML) algorithms have been intended to seamlessly collaborate for enabling intelligent networking in terms of massive service differentiation, prediction, and provides high-accuracy recommendation systems. Mobile edge computing (MEC) servers are located close to the edge networks to overcome the responsibility for massive requests from user devices and perform local service offloading. Moreover, there are required lightweight methods for handling real-time Internet of Things (IoT) communication perspectives, especially for ultra-reliable low-latency communication (URLLC) and optimal resource utilization. To overcome the abovementioned issues, this paper proposed an intelligent scheme for traffic steering based on the integration of MEC and lightweight ML, namely support vector machine (SVM) for effectively routing for lightweight and resource constraint networks. The scheme provides dynamic resource handling for the real-time IoT user systems based on the awareness of obvious network statues. The system evaluations were conducted by utillizing computer software simulations, and the proposed approach is remarkably outperformed the conventional schemes in terms of significant QoS metrics, including communication latency, reliability, and communication throughput.

FuzzyGuard: A DDoS attack prevention extension in software-defined wireless sensor networks

  • Huang, Meigen;Yu, Bin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3671-3689
    • /
    • 2019
  • Software defined networking brings unique security risks such as control plane saturation attack while enhancing the performance of wireless sensor networks. The attack is a new type of distributed denial of service (DDoS) attack, which is easy to launch. However, it is difficult to detect and hard to defend. In response to this, the attack threat model is discussed firstly, and then a DDoS attack prevention extension, called FuzzyGuard, is proposed. In FuzzyGuard, a control network with both the protection of data flow and the convergence of attack flow is constructed in the data plane by using the idea of independent routing control flow. Then, the attack detection is implemented by fuzzy inference method to output the current security state of the network. Different probabilistic suppression modes are adopted subsequently to deal with the attack flow to cost-effectively reduce the impact of the attack on the network. The prototype is implemented on SDN-WISE and the simulation experiment is carried out. The evaluation results show that FuzzyGuard could effectively protect the normal forwarding of data flow in the attacked state and has a good defensive effect on the control plane saturation attack with lower resource requirements.

Design of Integrated Security Framework for Open Wireless Networking Architecture (개방형 무선 통신망 구조를 위한 복합 보안 프레임워크 설계)

  • Kim, Jung Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.6
    • /
    • pp.1348-1353
    • /
    • 2013
  • The increasing demand of users for various wireless communication services has lead to the development with uniting co-existence of different and wireless networks. Each one of the these wireless networks has its own unique characteristics, as compared to other networks. An integrated security mechanism is one of the key issue in the open wireless network. To realize overall security mechanism in open wireless architecture, we should provide practical workable framework for the realization of the integrated security challenges. In this paper, we analysed integrated security platform and considerations based on the security concept.

Adaptive Mode Switching in Correlated Multiple Antenna Cellular Networks

  • Lee, Chul-Han;Chae, Chan-Byoung;Vishwanath, Sriram;Heath, Jr., Robert W.
    • Journal of Communications and Networks
    • /
    • v.11 no.3
    • /
    • pp.279-286
    • /
    • 2009
  • This paper proposes an adaptive mode switching algorithm between two strategies in multiple antenna cellular networks:A single-user mode and a multi-user mode for the broadcast channel. If full channel state information is available at the base station, it is known that a multi user transmission strategy would outperform all single-user transmission strategies. In the absence of full side information, it is unclear what the capacity achieving method is, and thus there are few criteria to decide which of the myriad possible methods performs best given a system configuration. We compare a single user transmission and a multi user transmission with linear receivers in this paper where the transmitter and the receivers have multiple antennas, and find that neither strategy dom inates the other. There is instead a transition point between the two strategies. Then, the mode switching point is determined both ana lytically and numerically for a multiple antenna cellular downlink with correlation between transmit antennas.

Localized Algorithm to Improve Connectivity and Topological Resilience of Multi-hop Wireless Networks

  • Kim, Tae-Hoon;Tipper, David;Krishnamurthy, Prashant
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.2
    • /
    • pp.69-81
    • /
    • 2013
  • Maintaining connectivity is essential in multi-hop wireless networks since the network topology cannot be pre-determined due to mobility and environmental effects. To maintain the connectivity, a critical point in the network topology should be identified where the critical point is the link or node that partitions the network when it fails. In this paper, we propose a new critical point identification algorithm and also present numerical results that compare the critical points of the network and H-hop sub-network illustrating how effectively sub-network information can detect the network-wide critical points. Then, we propose two localized topological control resilient schemes that can be applied to both global and local H-hop sub-network critical points to improve the network connectivity and the network resilience. Numerical studies to evaluate the proposed schemes under node and link failure network conditions show that our proposed resilient schemes increase the probability of the network being connected in variety of link and node failure conditions.

A Software Defined Networking Approach to Improve the Energy Efficiency of Mobile Wireless Sensor Networks

  • Aparicio, Joaquin;Echevarria, Juan Jose;Legarda, Jon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.6
    • /
    • pp.2848-2869
    • /
    • 2017
  • Mobile Wireless Sensor Networks (MWSN) are usually constrained in energy supply, which makes energy efficiency a key factor to extend the network lifetime. The management of the network topology has been widely used as a mechanism to enhance the lifetime of wireless sensor networks (WSN), and this work presents an alternative to this. Software Defined Networking (SDN) is a well-known technology in data center applications that separates the data and control planes during the network management. This paper proposes a solution based on SDN that optimizes the energy use in MWSN. The network intelligence is placed in a controller that can be accessed through different controller gateways within a MWSN. This network intelligence runs a Topology Control (TC) mechanism to build a backbone of coordinator nodes. Therefore, nodes only need to perform forwarding tasks, they reduce message retransmissions and CPU usage. This results in an improvement of the network lifetime. The performance of the proposed solution is evaluated and compared with a distributed approach using the OMNeT++ simulation framework. Results show that the network lifetime increases when 2 or more controller gateways are used.