• Title/Summary/Keyword: Wireless Network Management

Search Result 1,168, Processing Time 0.024 seconds

A Robust Mobile Video Streaming in Heterogeneous Emerging Wireless Systems

  • Oh, Hayoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2118-2135
    • /
    • 2012
  • With the rapid development of heterogeneous emerging wireless technologies and numerous types of mobile devices, the need to support robust mobile video streaming based on the seamless handover in Future Internet is growing. To support the seamless handover, several IP-based mobility management protocols such as Mobile IPv6 (MIPv6), fast handover for the MIPv6 (FMIPv6), Hierarchical MIPv6 (HMIPv6) and Proxy Mobile IPv6 (PMIPv6) were developed. However, MIPv6 depreciates the Quality-of-Service (QoS) and FMIPv6 is not robust for the video services in heterogeneous emerging wireless networks when the Mobile Node (MN) may move to another visited network in contrast with its anticipation. In Future Internet, the possibility of mobile video service failure is more increased because mobile users consisting of multiple wireless network interfaces (WNICs) can frequently change the access networks according to their mobility in heterogeneous wireless access networks such as 3Generation (3G), Wireless Fidelity (Wi-Fi), Worldwide Interoperability for Microwave Access (WiMax) and Bluetooth co-existed. And in this environment, seamless mobility is coupled according to user preferences, enabling mobile users to be "Always Best Connected" (ABC) so that Quality of Experience is optimised and maintained. Even though HMIPv6 and PMIPv6 are proposed for the location management, handover latency enhancement, they still have limit of local mobility region. In this paper, we propose a robust mobile video streaming in Heterogeneous Emerging Wireless Systems. In the proposed scheme, the MN selects the best-according to an appropriate metric-wireless technology for a robust video streaming service among all wireless technologies by reducing the handover latency and initiation time when handover may fail. Through performance evaluation, we show that our scheme provides more robust mechanism than other schemes.

NoCOM: Near-Optimal Cell Outage Management for Guaranteeing User QoS (사용자 서비스 품질 보장을 위한 근접-최적 셀 아웃티지 관리 기법)

  • Lee, Kisong;Lee, Howon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.4
    • /
    • pp.794-799
    • /
    • 2015
  • To manage cell outage problem in indoor wireless communication systems, we should resolve the problem of abrupt network failure quickly. In this paper, we propose a near-optimal cell outage management (NoCOM) scheme to support seamless services to users. In consideration of system throughput, user fairness, and the guarantee of QoS simultaneously, the NoCOM scheme finds the solution of subchannel and power allocations using a non-convex optimization technique and allocates radio resources to users iteratively. Through intensive simulations, we verify the outstanding performances of the proposed NoCOM scheme with respect to the average cell capacity, user fairness, and computational complexity.

Implementation of Electricity Management System based on the Wireless ICT (무선 ICT기반의 전력관리시스템 구현)

  • Kim, Min-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.5
    • /
    • pp.123-129
    • /
    • 2014
  • This paper suggests that it provides a electricity management system for wasting electricity, from power demand growth environments. This Energy management system based on ICT(Information & Communication Technology) can control Smart Power Outlet connecting to this system with Web Browser and Android phone, anytime, anywhere. Through analysis of acquisition data from them, this proposed system can monitor and control power consumption efficiently. This system was organized mesh network of Smart Power Outlet, gateway by wireless Zigbee, and ESS(Energy Saving System) by TCP/IP beyond existing limit of communication distance and space.

Interference Management Algorithm Based on Coalitional Game for Energy-Harvesting Small Cells

  • Chen, Jiamin;Zhu, Qi;Zhao, Su
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4220-4241
    • /
    • 2017
  • For the downlink energy-harvesting small cell network, this paper proposes an interference management algorithm based on distributed coalitional game. The cooperative interference management problem of the energy-harvesting small cells is modeled as a coalitional game with transfer utility. Based on the energy harvesting strategy of the small cells, the time sharing mode of the small cells in the same coalition is determined, and an optimization model is constructed to maximize the total system rate of the energy-harvesting small cells. Using the distributed algorithm for coalition formation proposed in this paper, the stable coalition structure, optimal time sharing strategy and optimal power distribution are found to maximize the total utility of the small cell system. The performance of the proposed algorithm is discussed and analyzed finally, and it is proved that this algorithm can converge to a stable coalition structure with reasonable complexity. The simulations show that the total system rate of the proposed algorithm is superior to that of the non-cooperative algorithm in the case of dense deployment of small cells, and the proposed algorithm can converge quickly.

The Effects of Wireless Technology on Distributed Group Decision-Making Practices (무선 기술의 사용이 분산 집단의사결정에 미치는 영향 연구)

  • Kwon, O-Byung;Kim, Tae-Kyung;Kim, Choong-Ryuhn
    • Asia pacific journal of information systems
    • /
    • v.12 no.2
    • /
    • pp.119-135
    • /
    • 2002
  • Those making decisions are no longer located in the same workplace. Wireless technology appears promising as a method to promote group performance in circumstances dependent on time, but not member proximity. However, the success of wireless technology in group decision-making situations has not yet been proven. This paper seeks to learn whether wireless technology affects the performance of group decision-making tasks that should be resolved urgently and/or sources of idea are disconnected with on-line network.

A Study on the Improvement of Wired and Wireless Network Survivability using Integrated IP Management (IP 통합 관리를 통한 유·무선 네트워크의 생존성 향상에 관한 연구)

  • Kim, Si-hung;Koo, Ja-Hwan;Park, Byung-Yeon;Park, Hark-Soo;Choi, Jang-Won;Lee, Jae Young
    • Convergence Security Journal
    • /
    • v.3 no.3
    • /
    • pp.43-50
    • /
    • 2003
  • Computer Communications and networks have been revolutionized by technological advances in the last decade. There has been an increasing interest in the network security because of the growing popularity of Internet and the importance of networking in business area. With this growing interest, Network engineers come to more concern about improving network survivability. In this paper, we suggest the method that improves the survivability of wired and wireless network. To achieve this goal, we propose the integrated IP management with monitoring network nodes in the same network and controlling its activities.

  • PDF

Research on the Issuing and Management Model of Certificates based on Clustering Using Threshold Cryptography in Mobile Ad Hoc Networking (이동 Ad Hoc 네트워킹에서 Threshold Cryptography를 적용한 클러스터 기반의 인증서 생성 및 관리 모델연구)

  • Park, Bae-Hyo;Lee, Jae-Il;Hahn, Gene-Beck;Nyang, Dae-Hun
    • Journal of Information Technology Services
    • /
    • v.3 no.2
    • /
    • pp.119-127
    • /
    • 2004
  • A mobile ad hoc network(MANET) is a network where a set of mobile devices communicate among themselves using wireless transmission without the support of a fixed network infrastructure. The use of wireless links makes MANET susceptible to attack. Eavesdroppers can access secret information, violating network confidentiality, and compromised nodes can launch attack from within a network. Therefore, the security for MANET depends on using the cryptographic key, which can make the network reliable. In addition, because MANET has a lot of mobile devices, the authentication scheme utilizing only the symmetric key cryptography can not support a wide range of device authentication. Thereby, PKI based device authentication technique in the Ad Hoc network is essential and the paper will utilize the concept of PKI. Especially, this paper is focused on the key management technique of PKI technologies that can offer the advantage of the key distribution, authentication, and non-reputation, and the issuing and managing technique of certificates based on clustering using Threshold Cryptography for secure communication in MANET.

Implementation of fast stream cipher AA128 suitable for real time processing applications (실시간 처리 응용에 적합한 고속 스트림 암호 AA128 구현)

  • Kim, Gil-Ho;Cho, Gyeong-Yeon;Rhee, Kyung Hyune;Shin, Sang Uk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.10
    • /
    • pp.2207-2216
    • /
    • 2012
  • Recently, wireless Internet environment with mobile phones and wireless sensor networks with severe resource restrictions have been actively studied. Moreover, an overall security issues are essential to build a reliable and secure sensor network. One of secure solution is to develop a fast cryptographic algorithm for data encryption. Therefore, we propose a 128-bit stream cipher, AA128 which has efficient implementation of software and hardware and is suitable for real-time applications such as wireless Internet environment with mobile phones, wireless sensor networks and Digital Right Management (DRM). AA128 is stream cipher which consists of 278-bit ASR and non-linear transformation. Non-linear transformation consists of Confusion Function, Nonlinear transformation(SF0 ~ SF3) and Whitening. We show that the proposed stream cipher AA128 is faster than AES and Salsa20, and it satisfies the appropriate security requirements. Our hardware simulation result indicates that the proposed cipher algorithm can satisfy the speed requirements of real-time processing applications.

Performance Evaluation of On-Demand Routing Protocol using Look-ahead Selective Flooding in Ad-hoc Network (Ad-hoc 네트워크에서 Look-ahead Selective Flooding을 이용한 On-Demand 라우팅 프로토콜 성능 개선)

  • Yo-chan Ahn
    • Journal of Information Technology Applications and Management
    • /
    • v.10 no.2
    • /
    • pp.61-71
    • /
    • 2003
  • Ad-hoc networks are characterized by multi-hop wireless links, frequently changing network topology and the need for efficient dynamic routing protocols. In an Ad-hoc network, each host assumes the role of a router and relays packets toward final destinations Because a packet is broadcast to all neighboring nodes, the optimality criteria of wireless network routing is different from that of wired network routing. tn this paper 1 point out the more important cost factor than the number of links in the Ad-hoc network. A class routing protocols called on-demand protocols has recently found attention because of their low routing overhead since it performs a blind flooding to look for a path. In this paper, 1 propose the method which reduces overhead by using the information of neighboring nodes and doing a selective flooding. Simulation results demonstrate better reduction of routing overheads with this scheme.

  • PDF