Capillary Networks play an important role in the growth of the Internet-of-Things, enabling wireless sensor networks to connect and use the capabilities of cellular networks through Capillary Gateways. Capillary Gateways facilitate the seamless integration of wireless sensor networks with cellular networks. Therefore, an optimal selection of the Capillary Gateways by the wireless sensor network is crucial for balancing the load between the gateways and optimizing the end-to-end path through both networks.
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...ijcseit
96% market share of existing Smart Grid network installations is wireless mesh networks [1]. The paper starts by justifying the selection of WMNs as opposed to any other communication technology based on quantifying the bandwidth/latency/QoS constraints of a number of Smart Grid applications. The main objective of this paper, however, is to discuss some optimization techniques that found in the literature and can be implemented to overcome some of the challenges currently being faced by WMNs deployment in Smart Grid’s NANs. Hybrid WMN (HWMN) is proposed as an optimization on the topology level to leverage WMNs convergence. Distributed Autonomous Data Routing DADR, multigate and diversity routing are optimizations on the protocol level to minimize the down time of WMNs. Cognitive Radio is investigated as an optimization on the physical level. The paper also explores the feasibility of using Wireless Software Defined Networks WSDN to improve the overall visibility and manageability of WMNs
The internet is considered to be the most advanced technology today and a gateway to modern communication and the sharing of information, products, services, and technology. Nowadays, users want to be able to access anywhere and anytime several services and applications, which is increasing data traffic and triggering a mobile data explosion. Iraq has major problems in increasing the growth and use of the internet and changing the standard method of communication. This is a big challenge, however, since there are several variables that characterize this phase of transformation. In this paper, the problems, vision, and solutions are presented in details. This study aims to clarify the factors of internet use in Iraq by the use of an acceptable approach and by suggesting new solutions for all the presented problems. This work also, clarify the expected traffic and the mechanism to transform the traffic between local ISP’s networks (AS) internet exchange points.
Analysis of back propagation and radial basis function neural networks for ha...IJECEIAES
In mobile systems, handoff is a vital process, referring to a process of allocating an ongoing call from one BS to another BS. The handover technique is very important to maintain the Quality of service. Handover algorithms, based on neural networks, fuzzy logic etc. can be used for the same purpose to keep Quality of service as high as possible. In this paper, it is proposed that back propagation networks and radial basis functions may be used for taking handover decision in wireless communication networks. The performance of these classifiers is evaluated on the basis of neurons in hidden layer, training time and classification accuracy. The proposed approach shows that radial basis function neural network give better results for making handover decisions in wireless heterogeneous networks with classification accuracy of 90%.
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...IJCNCJournal
Internet of Things (IoT) has become a popular technology in recent years. Different IoT applications such
as traffic control, environment monitoring, etc. contain many sensor devices, routers, actuators, edge
routers, and Base Stations (BS) which communicate with each other and send millions of data packets that
need to be delivered to their destination nodes successfully to ensure the High-performance communication
networks. IoT devices connect to the Internet using wired or wireless communication channels where most
of the devices are wearable, which means people slowly move from one point to another or fast-moving
using vehicles. How to ensure high performance of IoT data networks is an important research challenge
while considering the limitation of some IoT devices that may have limited power resources or limited
coverage areas. Many Kinds of research focus on how to customize routing protocols to be efficient for
IoT devices. The traditional routing mechanisms utilized specific IP addresses to identify users while in IoT
it is more beneficial to identify a group of users (things) based on any contexts, status, or values of their
resources such as the level of their batteries (e.g., low, medium or high). While IoT devices have different
characteristics, a multicasting mechanism to send one message to various groups of devices will not be
efficient in IoT communication networks since the aggregation of packets is very difficult. Thus, it is useful
to propose a mechanism that able to filter data packets that need to be sent to a specific group of devices.
In this paper, we propose efficient context-aware addressing mechanism, which is based on bloom filters
to increase the performance of IoT communication networks. A routing architecture is built based on
bloom filters which store routing information. In our works, we reduce the size of routing information
using a proposed aggregation mechanism which is based on connecting each group of IoT devices with an
edge router which is hierarchically connected to an upper router after operating its bloom filter. Our
simulation results show a significant improvement in the IoT performance metrics such as packets
transmission delay, jitter the throughput, packets dropping ratio, and the energy consumption in
comparison with well-known routing protocols of IoT such as Destination Sequenced Distance Vector
routing protocol (DSDV), and Ad hoc On-demand Distance Vector routing protocol (AODV).
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...ijcseit
96% market share of existing Smart Grid network installations is wireless mesh networks [1]. The paper starts by justifying the selection of WMNs as opposed to any other communication technology based on quantifying the bandwidth/latency/QoS constraints of a number of Smart Grid applications. The main objective of this paper, however, is to discuss some optimization techniques that found in the literature and can be implemented to overcome some of the challenges currently being faced by WMNs deployment in Smart Grid’s NANs. Hybrid WMN (HWMN) is proposed as an optimization on the topology level to leverage WMNs convergence. Distributed Autonomous Data Routing DADR, multigate and diversity routing are optimizations on the protocol level to minimize the down time of WMNs. Cognitive Radio is investigated as an optimization on the physical level. The paper also explores the feasibility of using Wireless Software Defined Networks WSDN to improve the overall visibility and manageability of WMNs
The internet is considered to be the most advanced technology today and a gateway to modern communication and the sharing of information, products, services, and technology. Nowadays, users want to be able to access anywhere and anytime several services and applications, which is increasing data traffic and triggering a mobile data explosion. Iraq has major problems in increasing the growth and use of the internet and changing the standard method of communication. This is a big challenge, however, since there are several variables that characterize this phase of transformation. In this paper, the problems, vision, and solutions are presented in details. This study aims to clarify the factors of internet use in Iraq by the use of an acceptable approach and by suggesting new solutions for all the presented problems. This work also, clarify the expected traffic and the mechanism to transform the traffic between local ISP’s networks (AS) internet exchange points.
Analysis of back propagation and radial basis function neural networks for ha...IJECEIAES
In mobile systems, handoff is a vital process, referring to a process of allocating an ongoing call from one BS to another BS. The handover technique is very important to maintain the Quality of service. Handover algorithms, based on neural networks, fuzzy logic etc. can be used for the same purpose to keep Quality of service as high as possible. In this paper, it is proposed that back propagation networks and radial basis functions may be used for taking handover decision in wireless communication networks. The performance of these classifiers is evaluated on the basis of neurons in hidden layer, training time and classification accuracy. The proposed approach shows that radial basis function neural network give better results for making handover decisions in wireless heterogeneous networks with classification accuracy of 90%.
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...IJCNCJournal
Internet of Things (IoT) has become a popular technology in recent years. Different IoT applications such
as traffic control, environment monitoring, etc. contain many sensor devices, routers, actuators, edge
routers, and Base Stations (BS) which communicate with each other and send millions of data packets that
need to be delivered to their destination nodes successfully to ensure the High-performance communication
networks. IoT devices connect to the Internet using wired or wireless communication channels where most
of the devices are wearable, which means people slowly move from one point to another or fast-moving
using vehicles. How to ensure high performance of IoT data networks is an important research challenge
while considering the limitation of some IoT devices that may have limited power resources or limited
coverage areas. Many Kinds of research focus on how to customize routing protocols to be efficient for
IoT devices. The traditional routing mechanisms utilized specific IP addresses to identify users while in IoT
it is more beneficial to identify a group of users (things) based on any contexts, status, or values of their
resources such as the level of their batteries (e.g., low, medium or high). While IoT devices have different
characteristics, a multicasting mechanism to send one message to various groups of devices will not be
efficient in IoT communication networks since the aggregation of packets is very difficult. Thus, it is useful
to propose a mechanism that able to filter data packets that need to be sent to a specific group of devices.
In this paper, we propose efficient context-aware addressing mechanism, which is based on bloom filters
to increase the performance of IoT communication networks. A routing architecture is built based on
bloom filters which store routing information. In our works, we reduce the size of routing information
using a proposed aggregation mechanism which is based on connecting each group of IoT devices with an
edge router which is hierarchically connected to an upper router after operating its bloom filter. Our
simulation results show a significant improvement in the IoT performance metrics such as packets
transmission delay, jitter the throughput, packets dropping ratio, and the energy consumption in
comparison with well-known routing protocols of IoT such as Destination Sequenced Distance Vector
routing protocol (DSDV), and Ad hoc On-demand Distance Vector routing protocol (AODV).
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
A Network and Position Proposal Scheme using a Link-16 based C3I SystemUniversity of Piraeus
The smart usage of hi-end military technological solutions in daily activities makes people life better. This paper describes a network and position proposal scheme in respect of technical networking and positioning information. A Link-16 based Command, Control, Communication and Intelligence (C3I) system is established among the mobile devices. Each device knows its geographical position using its GPS. A network along with a possible good position for user’s service is proposed, fulfilling his/her requirements for comfortable work.
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5Gijwmn
Machine to Machine communication or M2M, refers to a model of communication where devices communicate directly with each other using the available wired or wireless channels. M2M is a new concept proposed under 3GPP(3rd Generation Partnership Project); several research are working on providing solutions for M2M communication for the 5G networks. Challenges associated with M2M communication are the lack of standards, security, poor infrastructure, interoperability and diverse architecture. In this paper, we propose a new mechanism called TM2M5G (The Machine to Machine for 5G) based on SOFTNET platform which results in support of 5G heterogeneous network. In this paper, we
propose the architecture for M2M communication based on SOFTNET and provide new features support like security algorithms for data transmission among devices and scheduling algorithm for seamless transmission of data packets over the network. Finallysimulation results ofthis algorithm based on a system level simulator, considering two different approaches for analyzing the parameters such as delay, throughput and bandwidth are presented.
A Trust-Based Predictive Model for Mobile Ad Hoc Networkspijans
The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. Further, a routing protocol has been designed to ensure the secure and reliable end-to-end delivery of packets by only considering trustworthy nodes in the path. Simulation results show that our proposed trust model outperforms similar existing trust models.
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architectureijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP preservation and optimal data path management according to application needs. A functional setup validates and assays the proposed evolution in terms of inter-system handover preparation, interruption and completion time relative to control plane delay requirements of the 5G networks.
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of
managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP preservation and optimal data path management according to application needs. A functional setup validates and assays the proposed evolution in terms of inter-system handover preparation, interruption
and completion time relative to control plane delay requirements of the 5G networks.
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP
preservation and optimal data path management according to application needs. A functional setup
validates and assays the proposed evolution in terms of inter-system handover preparation, interruption and completion time relative to control plane delay requirements of the 5G networks.
International Journal on AdHoc Networking Systems (IJANS)pijans
In recent years, AdHoc networks have been attracting much interest in both academic and industrial communities. International Journal on AdHoc Networking Systems is an open access peer-reviewed journal that serves as a forum to discuss on ongoing research and new contributions. The journal addresses both practical and theoretical research in the areas of ad hoc networks, sensor networks, mesh networks and vehicular networks. Its main focus is on all issues from link layer up to the application layer. The journal solicits original technical papers that were not previously published and are not currently under review for publication elsewhere.
Data Communication in Internet of Things: Vision, Challenges and Future Direc...TELKOMNIKA JOURNAL
Ubiquitous technologies based heterogeneous networks has opened a new paradigm of technologies, which are enabled with various different objects called Internet of things (IoT). This field opens new door for innovative and advance patterns with considerable potential advantages in the shape of plethora of monitoring and infotainment applications around us. Data communication is one of the significant area of research in IoT due to its diverse network topologies, where diverse gadgets and devices have integrated and connected with each other. In order to communicate among devices and users, routing should be relible, secure and efficient. Due to diverse and hetrogenous netwok environment, the most of the existing routing solutions do not provide all quality of services requirement in the network. In this paper, we discuss the existing routing trend in IoT, vision and current challenges. This paper also elaborates the technologies and domains to drive this field for future perspectives. The paper concludes with discussion and main points for new researchers in terms of routing to understand about current situation in IoT.
Performance analysis of massive multiple input multiple output for high speed...IJECEIAES
This paper analytically reviews the performance of massive multiple input multiple output (MIMO) system for communication in highly mobility scenarios like high speed Railways. As popularity of high speed train increasing day by day, high data rate wireless communication system for high speed train is extremely required. 5G wireless communication systems must be designed to meet the requirement of high speed broadband services at speed of around 500 km/h, which is the expected speed achievable by HSR systems, at a data rate of 180 Mbps or higher. Significant challenges of high mobility communications are fast time-varying fading, channel estimation errors, doppler diversity, carrier frequency offset, inter carrier interference, high penetration loss and fast and frequent handovers. Therefore, crucial requirement to design high mobility communication channel models or systems prevails. Recently, massive MIMO techniques have been proposed to significantly improve the performance of wireless networks for upcoming 5G technology. Massive MIMO provide high throughput and high energy efficiency in wireless communication channel. In this paper, key findings, challenges and requirements to provide high speed wireless communication onboard the high speed train is pointed out after thorough literature review. In last, future research scope to bridge the research gap by designing efficient channel model by using massive MIMO and other optimization method is mentioned.
Capillary Networks – Bridging the Cellular and IoT WorldsEricsson
The Internet of Things (IoT) represents a new revolutionary era of computing technology that enables a wide variety of devices to interoperate through the existing Internet infrastructure.
Design and development of handover simulator model in 5G cellular network IJECEIAES
In the modern era of technology, the high speed internet is the most important part of human life. The current available network is reckoned to be slow in speed and not be up to snuff for data transmission regarding business applications. The objective of handover mechanism is to reassign the current session handle by internet gadget. The globe needs the next generation high mobility and throughput performance based internet model. This research paper explains the proposed method of design and development for handover based 5G cellular network. In comparison to the traditional method, we propose to control the handovers between base-stations using a concentric method. The channel simulator is applied over the range of the frequencies from 500 MHz to 150 GHz and radio frequency for the 700 MHz bandwidth. The performance of the simulation system is calculated on the basis of handover preparation and completion time regarding base station as well as number of users. From this experiment we achieve the 7.08 ms handover preparation time and 9.98 ms handover completion time. The author recommended the minimum handover completion time, perform the high speed for 5G cellular networks.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput IJECEIAES
Wireless Mesh Networks can be regarded as a type of communication technology in mesh topology in which wireless nodes interconnect with one another. Wireless Mesh Networks depending on the semi-static configuration in different paths among nodes such as PDR, E2E delay and throughput. This study summarized different types of previous heuristic algorithms in order to adapt with proper algorithm that could solve the issue. Therefore, the main objective of this study is to determine the proper methods, approaches or algorithms that should be adapted to improve the throughput. A Modified Binary Particle Swarm Optimization (MBPSO) approach was adapted to improvements the throughput. Finally, the finding shows that throughput increased by 5.79% from the previous study.
A Network and Position Proposal Scheme using a Link-16 based C3I SystemUniversity of Piraeus
The smart usage of hi-end military technological solutions in daily activities makes people life better. This paper describes a network and position proposal scheme in respect of technical networking and positioning information. A Link-16 based Command, Control, Communication and Intelligence (C3I) system is established among the mobile devices. Each device knows its geographical position using its GPS. A network along with a possible good position for user’s service is proposed, fulfilling his/her requirements for comfortable work.
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5Gijwmn
Machine to Machine communication or M2M, refers to a model of communication where devices communicate directly with each other using the available wired or wireless channels. M2M is a new concept proposed under 3GPP(3rd Generation Partnership Project); several research are working on providing solutions for M2M communication for the 5G networks. Challenges associated with M2M communication are the lack of standards, security, poor infrastructure, interoperability and diverse architecture. In this paper, we propose a new mechanism called TM2M5G (The Machine to Machine for 5G) based on SOFTNET platform which results in support of 5G heterogeneous network. In this paper, we
propose the architecture for M2M communication based on SOFTNET and provide new features support like security algorithms for data transmission among devices and scheduling algorithm for seamless transmission of data packets over the network. Finallysimulation results ofthis algorithm based on a system level simulator, considering two different approaches for analyzing the parameters such as delay, throughput and bandwidth are presented.
A Trust-Based Predictive Model for Mobile Ad Hoc Networkspijans
The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. Further, a routing protocol has been designed to ensure the secure and reliable end-to-end delivery of packets by only considering trustworthy nodes in the path. Simulation results show that our proposed trust model outperforms similar existing trust models.
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architectureijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP preservation and optimal data path management according to application needs. A functional setup validates and assays the proposed evolution in terms of inter-system handover preparation, interruption and completion time relative to control plane delay requirements of the 5G networks.
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of
managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP preservation and optimal data path management according to application needs. A functional setup validates and assays the proposed evolution in terms of inter-system handover preparation, interruption
and completion time relative to control plane delay requirements of the 5G networks.
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP
preservation and optimal data path management according to application needs. A functional setup
validates and assays the proposed evolution in terms of inter-system handover preparation, interruption and completion time relative to control plane delay requirements of the 5G networks.
International Journal on AdHoc Networking Systems (IJANS)pijans
In recent years, AdHoc networks have been attracting much interest in both academic and industrial communities. International Journal on AdHoc Networking Systems is an open access peer-reviewed journal that serves as a forum to discuss on ongoing research and new contributions. The journal addresses both practical and theoretical research in the areas of ad hoc networks, sensor networks, mesh networks and vehicular networks. Its main focus is on all issues from link layer up to the application layer. The journal solicits original technical papers that were not previously published and are not currently under review for publication elsewhere.
Data Communication in Internet of Things: Vision, Challenges and Future Direc...TELKOMNIKA JOURNAL
Ubiquitous technologies based heterogeneous networks has opened a new paradigm of technologies, which are enabled with various different objects called Internet of things (IoT). This field opens new door for innovative and advance patterns with considerable potential advantages in the shape of plethora of monitoring and infotainment applications around us. Data communication is one of the significant area of research in IoT due to its diverse network topologies, where diverse gadgets and devices have integrated and connected with each other. In order to communicate among devices and users, routing should be relible, secure and efficient. Due to diverse and hetrogenous netwok environment, the most of the existing routing solutions do not provide all quality of services requirement in the network. In this paper, we discuss the existing routing trend in IoT, vision and current challenges. This paper also elaborates the technologies and domains to drive this field for future perspectives. The paper concludes with discussion and main points for new researchers in terms of routing to understand about current situation in IoT.
Performance analysis of massive multiple input multiple output for high speed...IJECEIAES
This paper analytically reviews the performance of massive multiple input multiple output (MIMO) system for communication in highly mobility scenarios like high speed Railways. As popularity of high speed train increasing day by day, high data rate wireless communication system for high speed train is extremely required. 5G wireless communication systems must be designed to meet the requirement of high speed broadband services at speed of around 500 km/h, which is the expected speed achievable by HSR systems, at a data rate of 180 Mbps or higher. Significant challenges of high mobility communications are fast time-varying fading, channel estimation errors, doppler diversity, carrier frequency offset, inter carrier interference, high penetration loss and fast and frequent handovers. Therefore, crucial requirement to design high mobility communication channel models or systems prevails. Recently, massive MIMO techniques have been proposed to significantly improve the performance of wireless networks for upcoming 5G technology. Massive MIMO provide high throughput and high energy efficiency in wireless communication channel. In this paper, key findings, challenges and requirements to provide high speed wireless communication onboard the high speed train is pointed out after thorough literature review. In last, future research scope to bridge the research gap by designing efficient channel model by using massive MIMO and other optimization method is mentioned.
Capillary Networks – Bridging the Cellular and IoT WorldsEricsson
The Internet of Things (IoT) represents a new revolutionary era of computing technology that enables a wide variety of devices to interoperate through the existing Internet infrastructure.
Design and development of handover simulator model in 5G cellular network IJECEIAES
In the modern era of technology, the high speed internet is the most important part of human life. The current available network is reckoned to be slow in speed and not be up to snuff for data transmission regarding business applications. The objective of handover mechanism is to reassign the current session handle by internet gadget. The globe needs the next generation high mobility and throughput performance based internet model. This research paper explains the proposed method of design and development for handover based 5G cellular network. In comparison to the traditional method, we propose to control the handovers between base-stations using a concentric method. The channel simulator is applied over the range of the frequencies from 500 MHz to 150 GHz and radio frequency for the 700 MHz bandwidth. The performance of the simulation system is calculated on the basis of handover preparation and completion time regarding base station as well as number of users. From this experiment we achieve the 7.08 ms handover preparation time and 9.98 ms handover completion time. The author recommended the minimum handover completion time, perform the high speed for 5G cellular networks.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput IJECEIAES
Wireless Mesh Networks can be regarded as a type of communication technology in mesh topology in which wireless nodes interconnect with one another. Wireless Mesh Networks depending on the semi-static configuration in different paths among nodes such as PDR, E2E delay and throughput. This study summarized different types of previous heuristic algorithms in order to adapt with proper algorithm that could solve the issue. Therefore, the main objective of this study is to determine the proper methods, approaches or algorithms that should be adapted to improve the throughput. A Modified Binary Particle Swarm Optimization (MBPSO) approach was adapted to improvements the throughput. Finally, the finding shows that throughput increased by 5.79% from the previous study.
Ericsson Review: Capillary networks – a smart way to get things connectedEricsson
A capillary network is a local network that uses short-range radio-access technologies to provide local connectivity to things and devices. By leveraging the key capabilities of cellular networks – ubiquity, integrated security, network management and advanced backhaul connectivity – capillary networks will become a key enabler of the Networked Society.
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...chokrio
The systems based on intelligent sensors are currently expanding, due to theirs functions and theirs performances of intelligence: transmitting and receiving data in real-time, computation and processing algorithms, metrology remote, diagnostics, automation and storage measurements…The radio frequency wireless communication with its multitude offers a better solution for data traffic in this kind of systems. The mains objectives of this paper is to present a solution of the problem related to the selection criteria of a better wireless communication technology face up to the constraints imposed by the intended application and the evaluation of its key features. The comparison between the different wire-less technologies (Wi-Fi, Wi-Max, UWB, Bluetooth, ZigBee, ZigBeeIP, GSM/GPRS) focuses on their performance which depends on the areas of utilization. Furthermore, it shows the limits of their characteristics. Study findings can be used by the developers/ engineers to deduce the optimal mode to integrate and to operate a system that guarantees quality of communication, minimizing energy consumption, reducing the implementation cost and avoiding time con-straints.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...ijasuc
Mobile ad hoc networks are growing in popularity due to the explosive growth of modern
devices with wireless capability such as laptop, mobile phones, PDA, etc., makes the application more
challenging. The mobile nodes are vulnerable to security attacks. To protect the ad hoc network it is
essential to evaluate the trust worthiness. The proposed TWCA is similar to WCA in terms of cluster
formation and cluster head election. However, in WCA security features are not included. The proposed
TWCA is a cluster based trust evaluation, in which the mobile nodes are grouped into clusters with one
cluster head. It establishes trust relationship for the cluster based on the previous transaction result. The
simulation result confirms the efficiency of our scheme than the WCA and SEMC.
Efficiency Evaluation Metrics for Wireless Intelligent Sensors Applicationschokrio
The metrology field has been progressed with the
appearance of the wireless intelligent sensor systems providing more capabilities such as signal processing, remote multisensing fusion etc. This kind of devices is rapidly making their way into medical and industrial monitoring, collision avoidance, traffic control, automotive and others applications. However, numerous design challenges for wireless intelligent sensors systems are imposed to overcome the physical limitations in data traffic, such as system noise, real time communication,
signal attenuation, response dynamics, power consumption, and effective conversion rates etc, especially for applications requiring specific performances. This paper analyzes the performance metrics of the mentioned sensing devices systems which stands for superior measurement, more accuracy and reliability. Study findings prescribe researchers, developers/ engineers and users to realizing an optimal sensing motes design strategy that offers operational advantages which can offer cost-effective solutions for an application.
Internet Of Things(IoT) is emerging technology in future world.The term IoT comprises of Cloud computing, Data mining,
Big data analytics, hardware board. The Security and Interoperability is a main factor that influences the IoT Enegy
consumption is also main fator for IoT application designing.The various protocols such as MQTT,AMQP,XMPP are used in
IoT.This paper analysis the various protocols used in Internet of Things.
Interference Revelation in Mobile Ad-hoc Networks and Confrontationirjes
In this paper, we utilize the Several interference revelation techniques proposed for mobile ad hoc
networks rely on each node passively monitoring the data forwarding by its next hop. This paper presents
quantitative evaluations of false positives and their impact on monitoring based interference revelation for ad
hoc networks. Experimental results show that, even for a simple three-node configuration, an actual ad-hoc
network suffers from high false positives; these results are validated by Markov and probabilistic models.
However, this false positive problem cannot be observed by simulating the same network using popular ad hoc
network simulators, such as ns-2, OPNET or Glomosim. To remedy this, a probabilistic noise generator model
is implemented in the Glomosim simulator. With this revised noise model, the simulated network exhibits the
aggregate false positive behavior similar to that of the experimental tested. Simulations of larger (50-node) ad
hoc networks indicate that monitoring-based interference revelation has very high false positives. These false
positives can reduce the network performance or increase the overhead. In a simple monitoring-based system
where no secondary and more accurate methods are used, the false positives impact the network performance in
two ways: reduced throughput in normal networks without attackers and inability to mitigate the effect of
attacks in networks with attackers.
In this paper, we examine WiMAX – based network and evaluate the performance for quality of service (QoS) using an idea of IEEE 802.16 technology. In our models, the study used a multiprocessor architecture organized by the interconnection network. OPNET Modeler is used to simulate the architecture and to calculate the performance criteria (i.e. throughput, delay and data dropped) that
slightly concerned in network estimation. It is concluded that our models shorten the time quite a bit for
obtaining the performance measures of an end-to-end delay as well as throughput can be used as an
effective tool for this purpose.
International Journal of Computer Science, Engineering and Information Techno...ijcseit
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science, Engineering and Information Technology. The Journal looks for significant contributions to all major fields of the Computer Science and Information Technology in theoretical and practical aspects. The aim of the Journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...IJNSA Journal
Internet of Things (IoT) offers reliable and seamless communication for the heterogeneous dynamic lowpower and lossy network (LLNs). To perform effective routing in IoT communication, LLN Routing Protocol (RPL) is developed for the tiny nodes to establish connection by using deflaut objective functions: OF0, MRHOF, for which resources are constraints like battery power, computation capacity, memory communication link impacts on varying traffic scenarios in terms of QoS metrics like packet delivery ratio, delay, secure communication channel. At present, conventional Internet of Things (IoT) are having secure communication channels issue for transmission of data between nodes. To withstand those issues, it is necessary to balance resource constraints of nodes in the network. In this paper, we developed a security algorithm for IoT networks with RPL routing. Initially, the constructed network in corporates optimizationbased deep learning (reinforcement learning) for route establishment in IoT. Upon the establishment of the route, the ClonQlearn based security algorithm is implemented for improving security which is based onaECC scheme for encryption and decryption of data. The proposed security technique incorporates reinforcement learning-based ClonQlearnintegrated with ECC (ClonQlearn+ECC) for random key generation. The proposed ClonQlearn+ECCexhibits secure data transmission with improved network performance when compared with the earlier works in simulation. The performance of network expressed that the proposed ClonQlearn+ECC increased the PDR of approximately 8% - 10%, throughput of 7% - 13%, end-to-end delay of 5% - 10% and power consumption variation of 3% - 7%.
Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for...IJCNCJournal
Internet of Things (IoT) has become a popular technology in recent years. Different IoT applications such as traffic control, environment monitoring, etc. contain many sensor devices, routers, actuators, edge routers, and Base Stations (BS) which communicate with each other and send millions of data packets that need to be delivered to their destination nodes successfully to ensure the High-performance communication networks. IoT devices connect to the Internet using wired or wireless communication channels where most of the devices are wearable, which means people slowly move from one point to another or fast-moving using vehicles. How to ensure high performance of IoT data networks is an important research challenge while considering the limitation of some IoT devices that may have limited power resources or limited coverage areas. Many Kinds of research focus on how to customize routing protocols to be efficient for IoT devices. The traditional routing mechanisms utilized specific IP addresses to identify users while in IoT it is more beneficial to identify a group of users (things) based on any contexts, status, or values of their resources such as the level of their batteries (e.g., low, medium or high). While IoT devices have different characteristics, a multicasting mechanism to send one message to various groups of devices will not be efficient in IoT communication networks since the aggregation of packets is very difficult. Thus, it is useful to propose a mechanism that able to filter data packets that need to be sent to a specific group of devices. In this paper, we propose efficient context-aware addressing mechanism, which is based on bloom filters to increase the performance of IoT communication networks. A routing architecture is built based on bloom filters which store routing information. In our works, we reduce the size of routing information using a proposed aggregation mechanism which is based on connecting each group of IoT devices with an edge router which is hierarchically connected to an upper router after operating its bloom filter. Our simulation results show a significant improvement in the IoT performance metrics such as packets transmission delay, jitter the throughput, packets dropping ratio, and the energy consumption in comparison with well-known routing protocols of IoT such as Destination Sequenced Distance Vector routing protocol (DSDV), and Ad hoc On-demand Distance Vector routing protocol (AODV).
Similar to Gateway Selection in Capillary Networks (20)
Ericsson Technology Review: Versatile Video Coding explained – the future of ...Ericsson
Continuous innovation in 5G networks is creating new opportunities for video-enabled services for both consumers and industries, particularly in areas such as the Internet of Things and the automotive sector. These new services are expected to rely on continued video evolution toward 8K resolutions and beyond, and on new strict requirements such as low end-to-end latency for video delivery.
The latest Ericsson Technology Review article explores recent developments in video compression technology and introduces Versatile Video Coding (VVC) – a significant improvement on existing video codecs that we think deserves to be widely deployed in the market. VVC has the potential both to enhance the user experience for existing video services and offer an appropriate performance level for new media services over 5G networks.
BRIDGING THE GAP BETWEEN PHYSICAL AND DIGITAL REALITIES
The key role that connectivity plays in our personal and professional lives has never been more obvious than it is today. Thankfully, despite the sudden, dramatic changes in our behavior earlier this year, networks all around the world have proven to be highly resilient. At Ericsson, we’re committed to ensuring that the network platform continues to improve its ability to meet the full range of societal needs as well as supporting enterprises to stay competitive in the long term. We know that greater agility and speed will be essential.
This issue of our magazine includes several articles that explain Ericsson’s approach to future network development, including my annual technology trends article. The seven trends on this year’s list serve as a critical cornerstone in the development of a common Ericsson vision of what future networks will provide, and what sort of technology evolution will be required to get there.
ERIK EKUDDEN
Senior Vice President, Chief Technology Officer and Head of Group Function Technology
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...Ericsson
Today millimeter wave (mmWave) spectrum is valued mainly because it can be used to achieve high speeds and capacities when combined with spectrum assets below 6GHz. But it can provide other benefits as well. For example, mmWave spectrum makes it possible to use a promising new wireless backhaul solution for 5G New Radio – integrated access and backhaul (IAB) – to densify networks with multi-band radio sites at street level.
This Ericsson Technology Review article explains the IAB concept at a high level, presenting its architecture and key characteristics, as well as examining its advantages and disadvantages compared with other backhaul technologies. It concludes with a presentation of the promising results of several simulations that tested IAB as a backhaul option for street sites in both urban and suburban areas.
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...Ericsson
Critical Internet of Things (IoT) connectivity is an emerging concept in IoT development that enables more efficient and innovative services across a wide range of industries by reliably meeting time-critical communication needs. Mobile network operators (MNOs) are in the perfect position to enable these types of time-critical services due to their ability to leverage advanced 5G networks in a systematic and cost-effective way.
This Ericsson Technology Review article explores the benefits of Critical IoT connectivity in areas such as industrial control, mobility automation, remote control and real-time media. It also provides an overview of key network technologies and architectures. It concludes with several case studies based on two deployment scenarios – wide area and local area – that illustrate how well suited 5G spectrum assets are for Critical IoT use cases.
5G New Radio has already evolved in important ways since the 3GPP standardized Release 15 in late 2018. The significant enhancements in Releases 16 and 17 are certain to play a critical role in expanding both the availability and the applicability of 5G NR in both industry and public services in the near future.
This Ericsson Technology Review article summarizes the most notable new developments in releases 16 and 17, grouped into two categories: enhancements to existing features and features that address new verticals and deployment scenarios. This analysis and our insights about the future beyond Release 17 is an important component of our work to help mobile network operators and other stakeholders better understand and plan for the many new 5G NR opportunities that are on the horizon.
Ericsson Technology Review: The future of cloud computing: Highly distributed...Ericsson
The growing interest in cloud computing scenarios that incorporate both distributed computing capabilities and heterogeneous hardware presents a significant opportunity for network operators. With a vast distributed system (the telco network) already in place, the telecom industry has a significant advantage in the transition toward distributed cloud computing.
This Ericsson Technology Review article explores the future of cloud computing from the perspective of network operators, examining how they can best manage the complexity of future cloud deployments and overcome the technical challenges. Redefining cloud to expose and optimize the use of heterogeneous resources is not straightforward, but we are confident that our use cases and proof points validate our approach and will gain traction both in the telecommunications community and beyond.
Ericsson Technology Review: Optimizing UICC modules for IoT applicationsEricsson
Commonly referred to as SIM cards, the universal integrated circuit cards (UICCs) used in all cellular devices today are in fact complex and powerful minicomputers capable of much more than most Internet of Things (IoT) applications require. Until a simpler and less costly alternative becomes available, action must be taken to ensure that the relatively high price of UICC modules does not hamper IoT growth.
This Ericsson Technology Review article presents two mid-term approaches. The first is to make use of techniques that reduce the complexity of using UICCs in IoT applications, while the second is to use the UICCs’ excess capacity for additional value generation. Those who wish to exploit the potential of the UICCs to better support IoT applications have the opportunity to use them as cryptographic storage, to run higher-layer protocol stacks and/or as supervisory entities, for example.
Mobile data traffic volumes are expected to increase by a factor of four by 2025, and 45 percent of that traffic will be carried by 5G networks. To deliver on customer expectations in this rapidly changing environment, communication service providers must overcome challenges in three key areas: building sufficient capacity, resolving operational inefficiencies through automation and artificial intelligence, and improving service differentiation. This issue of ETR magazine provides insights about how to tackle all three.
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economyEricsson
The 5G network evolution has opened up an abundance of new business opportunities for communication service providers (CSPs) in verticals such as industrial automation, security, health care and automotive. In order to successfully capitalize on them, CSPs must have business support systems (BSS) that are evolved to manage complex value chains and support new business models. Optimized information models and a high degree of automation are required to handle huge numbers of devices through open interfaces.
This Ericsson Technology Review article explains how 5G-evolved BSS can help CSPs transform themselves from traditional network developers to service enablers for 5G and the Internet of Things, and ultimately to service creators with the ability to collaborate beyond telecoms and establish lucrative digital value systems.
Ericsson Technology Review: 5G migration strategy from EPS to 5G systemEricsson
For many operators, the introduction of the 5G System (5GS) to provide wide-area services in existing Evolved Packet System (EPS) deployments is a necessary step toward creating a full-service, future-proof 5GS in the longer term. The creation of a combined 4G-5G network requires careful planning and a holistic strategy, as the introduction of 5GS has significant impacts across all network domains, including the RAN, packet core, user data and policies, and services, as well as affecting devices and backend systems.
This Ericsson Technology Review article provides an overview of all the aspects that operators need to consider when putting together a robust EPS-to-5GS migration strategy and provides guidance about how they can adapt the transition to address their particular needs per domain.
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystemEricsson
The surge in data volume that will come from the massive number of devices enabled by 5G has made edge computing more important than ever before. Beyond its abilities to reduce network traffic and improve user experience, edge computing will also play a critical role in enabling use cases for ultra-reliable low-latency communication in industrial manufacturing and a variety of other sectors.
This Ericsson Technology Review article explores the topic of how to deliver distributed edge computing solutions that can host different kinds of platforms and applications and provide a high level of flexibility for application developers. Rather than building a new application ecosystem and platform, we strongly recommend reusing industrialized and proven capabilities, utilizing the momentum created with Cloud Native Computing Foundation, and ensuring backward compatibility.
The rise of the innovation platform
Society and industry are transforming at an unprecedented rate. At the same time, the network platform is emerging as an innovation platform with the potential to offer all the connectivity, processing, storage and security needed by current and future applications. In my 2019 trends article, featured in this issue of Ericsson Technology Review, I share my view of the future network platform in relation to six key technology trends.
This issue of the magazine also addresses critical topics such as trust enablement, the extension of computing resources all the way to the edge of the mobile network, the growing impact of the cloud in the telco domain, overcoming latency and battery consumption challenges, and the need for end-to-end connectivity. I hope it provides you with valuable insights about how to overcome the challenges ahead and take full advantage of new opportunities.
Ericsson Technology Review: Spotlight on the Internet of ThingsEricsson
The Internet of Things (IoT) has emerged as a fundamental cornerstone in the digitalization of both industry and society as a whole. It represents a huge opportunity not only in economic terms, but also from a global challenges perspective – making it easier for governments, non-governmental organizations and the private sector to address pressing food, energy, water and climate related issues.
5G and the IoT are closely intertwined. One of the biggest innovations within 5G is support for the IoT in all its forms, both by addressing mission criticality as well as making it possible to connect low-cost, long-battery-life sensors.
With this in mind, we decided to create a special issue of Ericsson Technology Review solely focused on IoT opportunities and challenges. I hope it provides you with valuable insights about the IoT-related opportunities available to your organization, along with ideas about how we can overcome the challenges ahead.
Ericsson Technology Review: Driving transformation in the automotive and road...Ericsson
A variety of automotive and transport services that require cellular connectivity are already in commercial operation today, and many more are yet to come. Among other things, these services will improve road safety and traffic efficiency, saving lives and helping to reduce the emissions that contribute to climate change. At Ericsson, we believe that the best way to address the growing connectivity needs of this industry sector is through a common network solution, as opposed to taking a single-segment silo approach.
The latest Ericsson Technology Review article explains how the ongoing rollout of 5G provides a cost-efficient and feature-rich foundation for a horizontal multiservice network that can meet the connectivity needs of the automotive and transport ecosystem. It also outlines the key challenges and presents potential solutions.
This presentation explains the importance of SD-WAN technology as part of the Enterprise digital transformation strategy. It goes over the first wave of SD-WAN in a single vendor deployment, with Do-it-yourself (DIY) as the preferred model. Then continues with the importance of orchestration in the second wave of SD-WAN deployments in a multi-vendor ecosystem, turning to SD-WAN Managed Services as the preferred model. It ends up with some examples of use cases and the Verizon customer case. More information on Ericsson Dynamic orchestration - http://m.eric.sn/6rsZ30psKLu
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...Ericsson
Time-Sensitive Networking (TSN) is becoming the standard Ethernet-based technology for converged networks of Industry 4.0. Understanding the importance and relevance of TSN features, as well as the capabilities that allow 5G to achieve wireless deterministic and time-sensitive communication, is essential to industrial automation in the future.
The latest Ericsson Technology Review article explains how TSN is an enabler of Industry 4.0, and that together with 5G URLLC capabilities, the two key technologies can be combined and integrated to provide deterministic connectivity end to end. It also discusses TSN standards and the value of the TSN toolbox for next generation industrial automation networks.
Ericsson Technology Review: Meeting 5G latency requirements with inactive stateEricsson
Low latency communication and minimal battery consumption are key requirements of many 5G and IoT use cases, including smart transport and critical control of remote devices. Thanks to Ericsson’s 4G/5G research activities and lessons learned from legacy networks, we have identified solutions that address both of these requirements by reducing the amount of signaling required during state transitions, and shared our discoveries with the 3GPP.
This Ericsson Technology Review article explains the why and how behind the new Radio Resource Control (RRC) state model in the standalone version of the 5G New Radio standard, which features a new, Ericsson-developed state called inactive. On top of overcoming latency and battery consumption challenges, the new state also increases overall system capacity by decreasing the processing effort in the network.
Ericsson Technology Review: Cloud-native application design in the telecom do...Ericsson
Cloud-native application design is set to become standard practice in the telecom industry in the near future due to the major efficiency gains it can provide, particularly in terms of speeding up software upgrades and releases. At Ericsson, we have been actively exploring the potential of cloud-native computing in the telecom industry since we joined the Cloud Native Computing Foundation (CNCF) a few years ago.
This Ericsson Technology Review article explains the opportunities that CNCF technology has enabled, as well as unveiling key aspects of our application development framework, which is designed to help navigate the transition to a cloud-native approach. It also discusses the challenges that the large-scale reuse of open-source technology can raise, along with key strategies for how to mitigate them.
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...Ericsson
To meet the requirements of use cases in areas such as the Internet of Things, AR/VR, Industry 4.0 and the automotive sector, operators need to be able to provide computing resources across the whole telco domain – all the way to the edge of the mobile network. Service exposure and APIs will play a key role in creating solutions that are both effective and cost efficient.
The latest Ericsson Technology Review article explores recent advances in the service exposure area that have resulted from the move toward 5G and the adoption of cloud-native principles, as well as the combination of Service-based Architecture, microservices and container technologies. It includes examples that illustrate how service exposure can be deployed in a multitude of locations, each with a different set of requirements that drive modularity and configurability needs.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Gateway Selection in Capillary Networks
1. Gateway Selection in Capillary Networks
Nicklas Beijar, Oscar Novo, Jaime Jim´enez and Jan Melen
Ericsson Research
Jorvas, Finland
Email: firstname.lastname@ericsson.com
Abstract—The world is adopting machine-type communica-
tion, wherein sensors and actuators blend seamlessly with the
environment around us, bringing a new ubiquitous computing
and communication era – a shift that is, to some extent,
illustrated by the explosive growth of the Internet of Things
(IoT). Capillary Networks play an important role in the growth
of IoT, enabling wireless sensor networks to connect and use the
capabilities of cellular networks through Capillary Gateways. In
that sense, Capillary Gateways facilitate the seamless integration
of wireless sensor networks with cellular networks. Therefore,
an optimal selection of the Capillary Gateways by the wireless
sensor network is crucial for balancing the load between the
gateways and optimizing the end-to-end path through both
networks. This paper describes a set of possible gateway selection
architectures and presents an algorithm for determining the
gateway selection based on policies and a set of constraints.
Then, the paper describes our implementation of two selected
architectures, discussing the solutions and challenges encountered
during implementation. Finally, the paper evaluates the traffic
and load generated by gateway selection.
Keywords—M2M, IoT, Internet of Things, Capillary Network,
self-organizing networks.
I. INTRODUCTION
With the growing presence of short-range radio-access
technologies and the proliferation of multiple heterogeneous
devices connected to Internet, the society is moving towards
a new vision, where a wide range of objects become part
of the Internet. The decreasing connectivity and technology
costs, as well as the increasing network penetration, are key
factors enabling that vision called the Internet of Things [1].
Internet of Things (IoT) encompasses any device that utilizes
embedded technology to communicate and interact with other
devices via Internet. This includes everything from automo-
tives, environmental sensors, and industrial machinery to home
appliances and wearable devices. The application possibilities
are endless and will profoundly change existing industries
such as health, logistics, agriculture and manufacturing as well
as create new unforeseen ones. Although IoT is emerging
as a technology, the current communication paradigm will
need to go beyond the traditional communication scenarios
– which have primarily been built to provide connectivity for
human interaction – and evolve into a scenario of billions of
ubiquitous interconnected devices.
According to market predictions [2], the majority of the
IoT devices are expected to use short-range radio technologies
such as Bluetooth Low Energy [3], IEEE 802.15.4 [4] or IEEE
802.11ah [5]. In this case, cellular networks can play a valuable
role in connecting the short-range radio networks, leveraging
on its ubiquity and advanced connectivity for backhaul, and
integrating security and network management into the scene.
Fig. 1: Capillary networks
The short-range network would act as the fine-grained last-
hop network connecting the tiniest devices. Thereby, they are
referred to as Capillary Network [6], [7], comparing them with
the tiny blood vessels connecting cells to the arteries. Capillary
Networks go beyond sensor networks, with not only sensor
data being transferred from devices to the cloud, but also cloud
applications being able to perform actuation on the devices.
Capillary networks consist of a set of devices connected
using short-range radio access technologies to a more powerful
device called Capillary Gateway. The gateway connects the
devices to the cellular backhaul network, transporting data to
an IoT Cloud service, which aggregates the incoming data
and manages devices and gateways. Figure 1 illustrates a
communication model between different capillary networks
(WIFI, Bluetooth) and two capillary gateways using the same
cellular network as backhaul (LTE). The sensor data is sent to
an IoT Cloud service that offers data aggregation and storage.
The IoT Cloud service also enables operators to offer services
to enterprise customers such as connectivity management of
the devices.
Typically, Capillary Network deployments do not involve
any network planning. The networks should be able to auto-
matically configure themselves in order to be easy to deploy.
This typically implies over-provisioning the network with
redundant gateways, which may have different properties in
terms of connectivity, capacity and – in the case of battery
powered gateways – also energy. Given the assumption that
there are multiple capillary gateways within reach offering
communication services with different properties, the capillary
network should be able to direct the sensors to the best capil-
lary gateway in order to achieve a specific goal. Examples of
2. such goals can be minimizing latency, maximizing availability
or providing load balancing. The mechanism that leads sensors
to the best capillary gateway is called Gateway Selection.
This mechanism reduces manual configuration of network
connectivity, provides redundancy of gateways and optimizes
the communication path across network technology borders.
This paper presents and evaluates various solutions for
gateway selection. Specifically, Section II presents three dif-
ferent architectures based on the required information, while
Section III further details the mechanism for calculating the
selection. Section IV applies the solution to existing proto-
cols and describes our prototype implementations. Different
approaches taken in the implementation of the gateway selec-
tion mechanism are evaluated in section V, and Section VI
concludes the paper.
II. GATEWAY SELECTION ARCHITECTURE
The gateway selection process depends on various types
of information that must be collected from the capillary
network. These gateway selection parameters are the input
for the gateway selection algorithm. Several architectures are
possible, depending on where in the network the selection
process is executed. The choice of location affects the need
to transport information and thereby the performance. This
section discusses the gateway selection parameters along with
the location of the gateway selection process.
A. Gateway Selection Parameters
Gateway selection relies on three types of information:
reachability information, constraints and policy. According to
these three parameters, the gateway selection algorithm selects
the best candidate for the capillary network.
1) Reachability information: Reachability information de-
scribes the possible connectivity between the IoT devices in a
capillary network and the capillary gateways around them. The
possibility of a link is determined by the existence of a radio
signal with sufficient strength in the short-range network. The
reachability information is therefore, at it simplest, described
as a set of possible connectivity links. However, the informa-
tion can be augmented with link quality data such as signal
strength, uptime or packet loss for each link. The reachability
information can be detected by either the gateway or by the IoT
devices. IoT devices typically detect connectivity by listening
to the beacon signals that gateways transmit.
2) Constraints: The constraint information describes the
properties of the network and the nodes that are included in the
selection process. Gateway properties can include the load of
the gateway (described as the processor load or by the number
of connected devices), the remaining battery level, or the cost
of use (backhaul costs, transit fees). Constraints describing the
cellular link quality and bandwidth allow selecting a gateway
with good uplink, so that the path through both network types
can be optimized. Most constraints can be specified on a per
gateway basis.
3) Policy: The policy determines the goal of the gateway
selection. Fundamentally, a policy is a set of priorities that
determines how the various constraints affect the best choice
of gateways. Policies are static and are defined by the network
Fig. 2: Control Point Architecture
management. The policy model is described in more detail in
III-A.
B. Location of the Gateway Selection Process
The gateway selection process can be controlled at various
locations in the network. The control point can be centralized,
distributed between the gateways, or distributed between the
devices. The location of the node(s) that controls the selection
process affects the need to transport the gateway selection
parameters to different places in the network. Below, the paper
discusses the alternatives in more detail:
1) Centralized: In the centralized alternative, there is a
centralized gateway selection server managing the selection as
shown in Figure 2 A. The reachability information is sent from
the devices or from management proxies in the gateways to
the management server. The constraint information is collected
3. from the gateways and sent to the management server. The
policy information is updated from the management interface
to the management server. The centralized server runs the
gateway selection algorithm creating a target distribution.
Changes in the target distribution are sent via the management
proxies to the concerned devices.
Since all the information is centrally available, there are no
convergence problems in the selection process. However, the
management server acts as a single point of failure and the
capacity of the management server limits the scalability of the
network. This is the major drawback in this design, although
it could be solved by redundant servers.
2) Distributed: In the distributed alternative, the selection
of the best candidate is done by the gateways themselves as
shown in Figure 2 B. In this approach, the gateways share the
reachability, constraint and policy information among them and
every gateway runs the same gateway selection algorithm to
choose the right candidate.
The main challenge of this alternative is the communication
needed between the gateways to synchronize the information.
To carry out this communication, either the cellular links or
the capillary network itself must be used. Both alternatives
have limited capacity. Moreover, because of the time required
by replication, the information at the gateways might be
inconsistent at some points in time. That inconsistency might
cause devices to get inconsistent commands from different
gateways during short periods of time.
In the case of large domains, the communication should
be limited to a minimum set of gateways to reduce delays.
Thus, gateways replicate information only to other nearby
gateways. Alternatively, one gateway could be established
as the decision-making node. This approach would be very
similar to the centralized approach above. This reduces the
time for replicating the information but, instead, the system
would become less robust due to having a single point of
failure.
3) Autonomous devices: In the autonomous devices alterna-
tive, the IoT devices make their own decision to which gateway
they connect. Figure 2 C shows this model. The reachability
information is then produced and utilized locally by the
devices. The constraint and policy information is requested by
every single IoT device from the gateways or from particular
servers in the network. In the latter case, the IoT device must
indicate to a constraint server the list of potential gateways,
and the constraint server replies with the constraints of the
aforementioned gateways.
One of the challenges with this approach is the complexity
required at the devices to run the gateway selection algorithm.
Typical IoT devices have limited processing power and mem-
ory, and executing the algorithm consumes the device’s battery.
Thus, this approach would be limited to IoT devices with
enough capacity or, in some cases, used in a hybrid approach
where the limited devices use a centralized approach instead.
Furthermore, it is difficult to implement load distribution in
this approach, since there is no coordination between the IoT
devices. Oscillation easily appears. For example, a gateway
with low load may cause a race of devices connecting to it,
suddenly increasing the load above the average.
Fig. 3: Policy Tree
III. GATEWAY SELECTION PROCESS
This section describes how the gateway selection process
works and how the best candidate is chosen according to the
gateway selection parameters. First, we describe how to model
the gateway selection parameters within the gateway selection
algorithm. Afterwards, we present the gateway selection algo-
rithm itself and provide an implementation example.
A. Algorithm Input
The gateway selection algorithm takes the policy, the
constraints and the reachability information as input in order
to produce a selection of gateway for each device as output.
1) Policies: To enable expressive policies, the policies are
described using a decision tree. A node in the tree can have
ordered branches toward other nodes as depicted in Figure 3.
Each branch carries a condition determining when the branch
is traversed. Processing starts from the root and traverses the
first of the ordered branches for which the condition is fulfilled.
The condition can specify that a branch is to be traversed for
a given (1) device, (2) gateway, (3) interface, or (4) node
type. Once no other branches can be traversed, the policy
description of that node is applied. The policy description is a
list of constraint names and the corresponding weights of those
constraints. Additionally, a constant value can be given with a
special constraint named ”priority”. Using this simple model,
a versatile range of policies can be described. The policy tree
can be described using JavaScript Object Notation (JSON) or
eXtensible Markup Language (XML). The former is used in
our implementation.
2) Reachability: Reachability information is collected from
devices and/or gateways. Based on the reachability informa-
tion, a full or partial reachability graph is built. The reach-
ability graph R has a link (g, d) between gateway g and
4. device d if either g has reported reachability to d, or d has
reported reachability to g. A timer is attached to each link in
the reachability graph. Reachability links that have not been
refreshed will be deleted from the graph after a time out.
3) Constraints: Constraints are key-value pairs describing
the properties of a gateway. The key is the constraint name c
and the value is a numeric value vc(g) of the constraint for a
specific gateway g.
B. Gateway Selection Algorithm
The algorithm operates by iterating through all devices to
find a target gateway for each device. In order to maintain
stability, the devices are iterated in the order of joining the
network. Thus, a recently joined device does not cause changes
in the allocation of the existing devices, but rather a suitable
gateway is determined for the newly joined device instead.
To find the gateway for a device d, a preference value
p(g) is calculated for each gateway g that is in the set of
reachable gateways G = {g : ∃(g, d) ∈ R}. For the specific
combination of gateways and devices, a node in the policy
tree is obtained as described in the previous subsection. The
policy node defines a set of constraints C with a weight wc for
each constraint c ∈ C. Additionally, a constant value k may
be defined (otherwise k = 0). The constant value k is defined
in Section III-A as ”priority”. The preference of a gateway g
is calculated by weighting the constraint value vc(g) with the
corresponding weight wc:
p(g) = k +
c∈C
wcvc(g) (1)
The gateway with the highest preference is selected for the
device d.
gsel(d) = argmax
g∈G
p(g) (2)
Additionally, for the purpose of load distribution, a particu-
lar constraint cconn(g) is dynamically defined for each gateway
g. This constraint reflects the number of devices allocated to
a gateway during a particular point in the algorithm. At the
start of the algorithm, the value is reset to cconn(g) = 0,
∀g ∈ G. Each time a node is allocated to a gateway g the
constraint is increased: cconn(g) = cconn(g)+1. The constraint
is used in the policy and the preference calculations like other
constraints.
C. Example
Let us use an example to illustrate the use of policies
to obtain different selection results. The example policy de-
scription in Figure 4 contains a generic policy (lines 11-12),
an exception policy for a specific device (lines 2-7), and an
exception policy for a given device type (lines 8-10). The
conditions for selecting the exception policies, i.e. the branches
in the policy tree, are specified on lines 2 and 8, respectively.
The generic policy gives the same weight for considering
both battery and load, but with different sign. Thus, the
preference of a gateway increases when the battery level of
the gateway increases, while the preference decreases when the
Fig. 4: Policy in JSON Format
load level increases. A gateway A with constraints {”load”: 1,
”battery”: 5} gets a preference of −2 ∗ 1 + 2 ∗ 5 = 8, while
a gateway B with constraints {”load”: 3, ”battery”: 4} gets a
lower preference of −2 ∗ 3 + 2 ∗ 4 = 2. Thus, gateway A is
selected.
The type-specific policy defines a branch for devices of
the type ”alarm”. The node at the branch instructs that alarm
devices should be connected to the gateway with the highest
reliability constraint.
The device-specific policy is defined by a branch for a
given device identity. Within the branch, a particular gateway
is defined (using a branch in the policy tree) to have a priority
of 100 while all other gateways have the priority of 1; thus,
the device is allocated to the indicated gateway unless it is
unavailable. The special constraint ”priority” is used to specify
constant values.
IV. IMPLEMENTATION
During our implementation phase, both the distributed
and the centralized architecture were implemented. The au-
tonomous architecture was deemed impractical for constrained
devices due to its requirements on processing power and
memory, the usage of which were already close to the limits.
This section describes the implementation from a technical
viewpoint while the next section will explain the reason behind
each choice made.
A. Implementation of Distributed Architecture
In the distributed architecture, gateways share their con-
straints and reachability information. Each gateway imple-
ments the gateway selection algorithm in a replicated way
based on the information. The information must be synchro-
nized between gateways to ensure that all gateways obtain the
same result.
Since gateways need to share information, they need to
have connectivity to each other. This could be achieved using
the cellular uplink, the capillary network itself, or through a
separate network. Connecting all gateways with each other in
a mesh would not be scalable, therefore the network was split
into gateway selection domains. Within each domain, gateways
share information and devices can only move between the
5. gateways in the domain. 1
In our prototype implementation,
we connected gateways with Ethernet for simplicity.
For distributing information between the gateways, we
extended the Open Shortest Path First (OSPF) [8] routing pro-
tocol with custom link state advertisements. When a constraint
value of a gateway changes, this gateway advertises the new
constraint value to all other gateways over OSPF. To reduce
the backhaul traffic caused by downloading policies from
the management server, the gateway with the highest OSPF
identifier is selected as the master. The master periodically
downloads the policy and distributes any changes between
the gateways. The policy is provided using a HTTP REST
[9] interface to the gateways. Consequently, the management
server only has a minimal role in supporting gateway selection
by providing the policy. 2
In this implementation, TMote Sky [10] devices were
used as sensors. They run 6LoWPAN [11] over an IEEE
802.15.4 interface. We based our device implementation on
the Contiki operating system, with the RPL (IPv6 Routing
Protocol for Low-Power and Lossy Networks) [12] routing
protocol between the gateway and the device. RPL implements
the messaging for allowing the gateway and the device to
detect each other. At the application layer devices imple-
ment two protocols: Constrained Application Protocol (CoAP)
[13] for data communication, and Lightweight M2M Protocol
(LWM2M) [14] for device management part. LWM2M objects
at the device represent the reachable gateways, the target
gateway selection and the currently connected gateway.
The IEEE 802.15.4 interface of the gateway is implemented
by using a USB-connected TMote Sky device, which operates
as the root for RPL. RPL uses a Destination-Oriented Directed
Acyclic Graph Identifier (DODAGID) to identify the RPL
root. The root device provides a HTTP REST interface [9]
toward the software in the gateway. This REST interface allows
the gateway software to query the root about devices in the
network that the root can reach. Reachability information is
thus generated by the gateway. Reachability in this sense is
defined as the existence of a RPL route between the device
and the gateway.
When a device joins the network, it first selects a random
root device, i.e. a random gateway. The gateway detects the
existence of this device by periodically querying the root. Each
gateway advertises the connected devices over a custom OSPF
link state advertisement to other gateways. Consequently, every
gateway learns about all devices in the network.
Each time there is a change in reachability, policy or
constraint information obtained via OSPF, the gateway selec-
tion algorithm is restarted. As OSPF quickly floods changes
between gateways, all gateways use the same information and
starts the algorithm roughly at the same time. It is important
that all gateways processes the devices in the same order so
that all gateways obtain the same result. Implementing the join
order, as described in Section III-B, is difficult because of
1In the case gateway selection is needed between the domains, a hierarchical
solution combining distributed and centralized architectures can be used.
2The management server may additionally be responsible for bootstrapping,
registration, access control, configuration, and other management functions for
both devices and gateways. These are out of the scope of this paper.
Fig. 5: Gateway Selection Sequence Diagram for the centralized architecture
the need to synchronize clocks. Therefore, devices are ordered
according to their MAC address instead.
To make the device switch a gateway, the gateway to
which the device currently is connected sends a command to
the device. The command is implemented as a LWM2M like
command transported over CoAP. The command contains the
DODAGID of the target gateway. Additionally, the command
can include a list of alternative gateways to be used in case
the target gateway becomes unavailable.
B. Implementation of Centralized Architecture
The selection of the gateway in the centralized architecture
is controlled by a central node: the gateway selection server.
Implementation-wise, the gateway selection server is either
integrated as a part of the management server or implemented
as a separate component connected to the management server.
In our implementation, the gateway selection server is part of
the management server. Additionally, the management server
is connected to a management interface, which provides a
dashboard for managing the IoT network. The management
interface graphically presents the gateways devices connected
to it and allows editing the policy.
The main function of the gateway selection server is to
collect the reachability, constraints and policy information as
input and generate the target allocation of devices to gateways.
Our server exposes a HTTP REST interface for the gateways
to post updated constraint information. Constraints can also
be edited from the management interface, which is useful for
testing and demos. The policy is locally stored on the gateway
selection server and updated by the management interface
through a set of HTTP REST commands. Both policies and
constraints are described in JSON format.
In the centralized implementation, two types of devices
are supported: IEEE 802.15.4 based devices with RPL routing
and IEEE 802.11b/g based devices. Depending on the device
type, the reachability information can be obtained either from
gateways or from the devices.
6. The first case is utilized on TMote Sky devices operating
over IEEE 802.15.4 radio. The devices run RPL [12] to create
routes toward the RPL root, and the root provides a REST
interface for the gateway to obtain the list of the neighbours
reachable from the root. The gateway posts changes in the
reachability information to the gateway selection server.
The second case is used in Libelium Wasmote devices [15]
with IEEE 802.11b/g [5] wireless capabilities. Libelium Wasp-
mote devices provide a device centric view of the reachability.
The Waspmote performs a scan over all channels to find the
SSIDs of the surrounding gateways. This scan is initiated by
a command from the server. The reachability information is
posted via the gateway to the gateway selection server.
Our gateways support several interfaces per gateway. Thus,
a gateway can have both IEEE 802.15.4 and IEEE 802.11b/g
interfaces, and even several interfaces of the same type. For
IEEE 802.15.4, the interface is identified by the Destination-
Oriented Directed Acyclic Graph Identifier (DODAGID), and
in IEEE 802.11b/g the interface is identified by a Service
Set Identifier (SSID). Consequently, reachability and gateway
selection commands contain these interface identifiers.
After all the input information is gathered, the gateway
selection server finds out the best gateway interface for every
device and sends the interface identifier information to the
affected devices. Messages are forwarded via the gateway in
which the device currently is connected to. In our implemen-
tation, different protocols are needed to send the command to
different device types. The TMote Sky supports CoAP, and the
implementation works like in the distributed implementation.
Since the Waspmote do not support IPv6 and CoAP, we
implemented a HTTP REST interface to the device instead.
In a final implementation, without the above restrictions, the
Lightweight Machine to Machine (LWM2M) [14] protocol
would be used instead.
The management of the devices from the gateway selection
server could be implemented with transparent gateways, allow-
ing management commands to be sent to devices directly from
the management server to the device. However, in a practical
implementation, a few issues suggest involving the gateways
as a proxy on the management path. Firstly, the reachability
information within the IEEE 802.15.4 wireless network needs
to be collected from the gateway perspective. That implies the
gateway needs to act as a LWM2M client as well. Secondly,
in the case of NAT [16] between the Management Server and
the devices, a proxy in the gateway simplifies the tunnelling
of inbound commands over an outbound connection. Thirdly,
Libelium Wasmote devices [15] do not support CoAP [13]. The
LWM2M protocol is transported on top of CoAP. That means
that a conversion between CoAP and HTML was needed and
the gateways are the best candidates due to their processing
power. All these reasons made us decide to implement a
management proxy in each gateway acting as a back-to-back
server and client.
Figure 5 shows the interaction of the different elements
involved in sharing the reachability information between the
Libelium Waspmote devices and the Management Server com-
ponent. First of all, the Libelium Waspmote device automati-
cally connects to a network. Once the device has connected, it
will send a registration message (1) to a gateway in which its
address is predefined in the sensor’s EEPROM. That informa-
tion will contain the device’s MAC address and the SSID of
the network that the sensor is connected to. After the sensor
is registered, the gateway will ask (3) the sensor to scan all
the available access points (AP) around it. Then, the Libelium
Waspmote will perform an active probe scan of access points
in all the 13 channels and returns (4) to the gateway the MAC
address, signal strength, SSID name, and security mode of the
found access points. The scan command output [17] format is:
Channel RSSI Security WPA Conf WPS MAC Address SSID
The gateways will forward that information to the man-
agement server. The management server will read the list of
reachable gateways and send a command (6,7) to the device.
That command will include in the payload a list of target
gateways in priority order to allow for backups in case of
failure of the target gateway. The sensor will try to connect
to the first option or, subsequently, to the consecutive options
if that fails. Once the device changes gateway, the registration
message (9,10) is triggered again.
V. EVALUATION
In this section, we evaluate the three architecture options
and provide some insights that help to clarify our preference
for the centralized solution.
Figure 6 shows the message paths for different types of
operations in the three architectures. The figure focuses on
messages over the two wireless interfaces: the mobile backhaul
and the capillary network. The figure assumes that Device1
and Device2 are reachable from Gateway2 while Gateway1
cannot reach any device.
Policies are distributed infrequently as they are rather static.
In the centralized architecture the new policy is not transported
over any wireless interface. In the distributed architecture, the
updated policy must be sent to each gateway separately. In the
autonomous architecture, the new policy must be sent to all
gateways, which forward it to all reachable devices.
In the centralized architecture, it is sufficient to transport
the updated constraints of a gateway to the management server.
In the distributed architecture, the constraints must be sent
to all gateways over the mobile network. The transmission
between a pair of gateways requires one message in the uplink
direction and one in the downlink direction. In the autonomous
architecture, the gateway sends its updated constraint to all
reachable devices.
Reachability updates are frequent if devices are mobile.
Updated reachability information generated by a device must
traverse both the capillary and the mobile networks to reach
the management server in the centralized architecture. In the
distributed architecture, the message must be flooded between
gateways, each transmission passing over the mobile network
twice. In the autonomous architecture, the reachability infor-
mation is only used locally by the device.
Each time a parameter changes, the target gateway of one
or more devices may change. In the centralized architecture,
a command to switch gateway is sent over the two wireless
interfaces to the affected devices. In the distributed archi-
tecture, each gateway locally performs the gateway selection
7. Fig. 6: Messages used in the evaluation
algorithm. Messages are needed to be sent only to the affected
devices over the capillary network interface. In the autonomous
architecture, the device performs the calculation locally and
switches gateway without any messaging.
Distributed Centralized Autonomous
Cell Cap Cell Cap Cell Cap
Policy N 0 0 0 N M
Constraints 2N(N − 1) 0 1 0 0 D
Reachability 2N(N − 1) 1 1 1 0 0
GW Selection 0 1 1 1 0 0
TABLE I: Number of messages per operation
Table I shows an analysis of the traffic required for each of
the above operations. To make the comparison more generic,
we count the number of HTTP REST requests instead of
the number of bytes or messages. Thus, we do not consider
message size, connection setup, acknowledgement, fragmen-
tation and packet loss. We separately consider messages in
the cellular uplink (abbreviated as Cell) and the capillary
network (abbreviated Cap). In the distributed solution, we
assume that the gateways communicate with each other via
the cellular network, so that each request traverses the cellular
network twice. We denote the number of gateways with N
and the number of devices with M. The average number
of devices within reach of a gateway is denoted D, which
typically is D ∝ M/N. For flooding in OSPF, we assume
full connectivity, thus a message from one gateway is sent to
N −1 other gateways. Sending a message to all devices under
a gateway is assumed to be implemented with unicast using
HTTP REST, rather than broadcast.
Based on Table I, we can analyse the total traffic generated
for different scenarios. The traffic is dependent on the frequen-
cies of updates in the gateway selection parameters. We denote
the frequency of policy updates with fpol, the frequency of
constraint changes per gateway with fconst, and the frequency
of reachability updates per device with freach. The frequency
of gateway selection commands, fsel, is proportional to the
total number of updates fpol + Mfreach + Nfconst as each
update may, with a given probability, cause a device to be
allocated to another gateway. In our analysis, a selection
command is sent once per 10 updates, but the choice of value
turned out to have only a minor effect on traffic. D denotes
the average number of devices within reach of a gateway.
We assume every devices can be reach from three different
gateways. The default values of the parameters are given in
Table II.
Parameter Default value
fpol 1 update / 24 h
fconst 1 update / 1 h
freach 1 update / 10 min
fsel (fpol + Mfreach + Nfconst)/10
D 3M/N
TABLE II: Default values of parameters in the analysis
Figure 7 shows the total number of requests in the network
for a network with 10000 devices and 1000 gateways. Figure
8 shows the same scenario for a network, where the same
10000 devices are distributed between 100 gateways. In both
figures, the frequency of reachability updates freach varies
between one update per 1 minute and one update per 24 hours.
This correspond to different degree of device mobility. We see
that the distributed architecture generates several magnitudes
higher traffic than the other architectures. The centralized
architecture generates least traffic, except when mobility is
high, when the autonomous architecture performs better. In
Figure 9 the frequency of constraint updates freach varies
between one update per 1 minute and one update per 24 hours.
This mainly affects the traffic in the autonomous architecture.
We noticed that varying the other parameters only has a minor
effect on the traffic. The last table, Table III, evaluates the
load on the management server. In all evaluated cases, the
centralized architecture showed the highest load on the server.
8. 1
10
100
1,000
10,000
100,000
1,000,000
10,000,000
100,000,000
1,000,000,000
Distributed
Centralized
Autonomous
Requests
per
minute
1
min
10
min
1
h
24
h
Fig. 7: Requests for various reachability update frequencies, 100 gateways
1
10
100
1,000
10,000
100,000
1,000,000
10,000,000
100,000,000
1,000,000,000
10,000,000,000
100,000,000,000
Distributed
Centralized
Autonomous
Requests
per
minute
1
min
10
min
1
h
24
h
Fig. 8: Requests for various reachability update frequencies, 1000 gateways
1
10
100
1,000
10,000
100,000
1,000,000
10,000,000
100,000,000
1,000,000,000
10,000,000,000
Distributed
Centralized
Autonomous
Requests
per
minute
1
min
10
min
1
h
24
h
Fig. 9: Requests for various constraint update frequencies, 1000 gateways
VI. CONCLUSION
In this paper, we addressed the problem of gateway selec-
tion in a capillary network. Without any mechanism, a device
typically selects the gateways randomly, without considering
the uplink capacity or the properties of the gateways. Gateway
selection allows devices to make informed selection in order to
globally optimize the network. The paper presents an overview
of different gateway selection solutions for capillary networks,
some of which we implemented. The solutions mainly differ in
the location where the selection decision is made. According
to our analysis, a distributed architecture creates a high amount
of traffic in the cellular network. The centralized architecture
has low traffic both in the capillary and the cellular network but
the load on the management server is high. The autonomous
devices make the network simple with low traffic and low load
on the server, but the device itself has a high complexity as it
Load on Server
Distributed Nfpol
Centralized Nfconst + Mfreach + Mfsel
Autonomous Nfpol
TABLE III: Load on the Management Server
must perform the gateway selection. This complexity is often
too demanding for the current sensors. Our implementation
utilizes flexible policies, which takes into account multiple
factors to select the optimal gateway. With automatic gateway
selection, load can be distributed between gateways, while con-
sidering gateway properties, such as current load. This allows
a better utilization of the network resources and optimization
of the end-to-end path through both networks.
ACKNOWLEDGMENT
The authors would like to thank Tero Kauppinen, Miika
Komu and Mert Ocak for their contribution in the implemen-
tation of the prototypes and Petri Jokela for his feedback.
REFERENCES
[1] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of
things (iot): A vision, architectural elements, and future directions,”
Future Gener. Comput. Syst., vol. 29, no. 7, pp. 1645–1660, Sep. 2013.
[Online]. Available: http://dx.doi.org/10.1016/j.future.2013.01.010
[2] O. Mazhelis, H. Warma, S. Leminen, P. Ahokangas, P. Pussinen,
M. Rajahonka, R. Siuruainen, H. Okkonen, A. Shveykovskiy, and
J. Myllykoski, “IoT SOTA report 2013 - Internet-of-Things Market,
Value Networks, and Business Models: State of the Art Report,” Jan.
2013. [Online]. Available: http://www.internetofthings.fi/
[3] “Bluetooth standards.” [Online]. Available: https://www.bluetooth.org/
en-us/specification/adopted-specifications
[4] “IEEE 802.15 standard.” [Online]. Available: http://www.ieee802.org/15
[5] “IEEE 802.11 standard.” [Online]. Available: http://www.ieee802.org/
11/
[6] S. Singh and K.-L. Huang, “A robust m2m gateway for effective
integration of capillary and 3gpp networks,” ser. Advanced Networks
and Telecommunication Systems (ANTS), S. Singh and K.-L. Huang,
Eds. 2011 IEEE 5th International Conference, 2011, pp. 1–3.
[7] V. Misic, J. Misic, X. Lin, and D. Nerandzic, “Capillary machine-to-
machine communications: The road ahead,” in Ad-hoc, Mobile, and
Wireless Networks, ser. Lecture Notes in Computer Science, X.-Y. Li,
S. Papavassiliou, and S. Ruehrup, Eds. Springer Berlin Heidelberg,
2012, vol. 7363, pp. 413–423.
[8] RFC 5340; OSPF for IPv6, IETF.
[9] L. Richardson and S. Ruby, RESTful Web Services. O’Reilly Media,
2008.
[10] “TMote Sky Datasheet.” [Online]. Available: http://www.eecs.harvard.
edu/∼konrad/projects/shimmer/references/tmote-sky-datasheet.pdf
[11] RFC 6282; Compression Format for IPv6 Datagrams over IEEE
802.15.4-Based Networks, IETF.
[12] RFC 6550; RPL: IPv6 Routing Protocol for Low-Power and Lossy
Networks, IETF.
[13] RFC 7252; The Constrained Application Protocol (CoAP), IETF.
[14] Lightweight Machine to Machine, Technical Specification, Open Mobile
Alliance (OMA), 2014.
[15] “Libelium webpage.” [Online]. Available: http://www.libelium.com/
[16] RFC 2663; IP Network Address Translator (NAT) Terminology and
Considerations, IETF.
[17] “Microchip, Wifly Command Reference.” [Online]. Available: http:
//ww1.microchip.com/downloads/en/DeviceDoc/50002230A.pdf