Robust protocols for the Industrial Internet of Things

Size: px
Start display at page:

Download "Robust protocols for the Industrial Internet of Things"

Transcription

1 Robust protocols for the Industrial Internet of Things Elvis Vogli Politecnico di Bari,Telematics Lab - Dipartimento di Ingegneria Elettrica e dell Informazione Via Edoardo Orabona 4, Bari, Italy elvis.vogli@poliba.it Abstract. The Internet of Things (IoT) paradigm envisions a world with an enormous amount of connected devices. Among the IoT technologies a key role is played from the short range wireless communications. One of the most used standards in this context is IEEE On the top of it the IETF has already defined an IPv6 enabled protocol stack. Furthermore the Time Slotted Channel Hopping (TSCH) Medium Access Control (MAC) was introduced in the recent IEEE e amendment to further improve energy efficiency and reliability. Despite the big standardization efforts there are still many technical issues to be faced. The purpose of my research project falls in the short range wireless communications context applied to industrial IoT scenarios and the optimization of related protocol stacks. In the following there are described the main findings related to media access, network formation, security and data interoperability. Keywords: IEEE , Time Slotted Channel Hopping, Industrial Internet of Things, Machine to Machine 1 Introduction The IoT represents, in the context of networking and services, one of the most relevant innovations of the third millennium [1]. At the same time, the IoT entails an unprecedented gamut of new technical challenges, only partially addressed so far [2]. In industrial IoT, the power efficient IEEE standard plays a key role. On the top of it, a full Internet protocol stack is standardized by Internet Engineering Task Force (IETF) [3]. In particular, the IETF IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) adaptation layer implements Internet Protocol version 6 (IPv6) and enables universal Internet connectivity, the IETF Routing Over Low power and Lossy networks (ROLL) defines a routing protocol, and finally the IETF Constrained Application Protocol (CoAP) defines a lightweight application protocol and enables Representational State Transfer (REST) architecting in constrained devices. In addition in 2012 it was published the latest amendment IEEE e which adds more reliability and energy efficiency to the existing MAC. One of the most important features introduced in this amendment is the TSCH mode. The sloted medium access enables an efficient use of the power, whereas the channel hopping improves the communication reliability making it more suitable for industrial applications. In TSCH it is defined a sloted structure like the one shown in

2 2 Elvis Vogli Workshop: Authors Instructions Fig. 1. The time is divided in slotframes, each slotframe in slots and there are 16 available channels. Each mote synchronized to the network should receive in the Enhanced Beacon (EB) advertised from the network coordinator, the slotframe size and the Absolute Slot Number (ASN), where ASN is the total number of timeslots that has elapsed since the start of the network. The motes also in order to communicate should be scheduled in the same cell which is identified from the slot-offset (S o f f - the relative position of a slot within a slotframe) and the channel-offset a(c h o f f - frequency hopping parameter). The physical frequency is then determined according to the eq. 1. In the standard it is only defined how is executed a schedule but the effective scheduling is out of scope of the standard and a lot of work needs to be done in order to take advantage of this features. f = F {(ASN + c h o f f ) mod n c h } (1) To overcome this issues the IETF working group IPv6 over the TSCH mode of IEEE e (6TiSCH) has been created to integrate the latest MAC to the protocol stack. In my research activity i have exploited solutions and optimizations related to TSCH and other problems of this protocol stack which can as far as now be categorized in the following areas: 1) energy efficiency and reliability 2) security 3) data interoperability. In the following sections there are briefly described the main outcomes of my research activity. In sec. 2 four fast synchronization algorithms are implemented, in sec. 3 it is evaluated a traffic aware scheduling for TSCH, sec. 4 introduces a security framework for based networks and in sec. 5 there are considered data interoperability issues in a M2M scenarios. Finally sec. 6 draws some conclusion and future researches. Moreover all the solutions have been evaluated experimentally in real testbeds using the OpenWSN framework [4]. Fig. 1: The schedule structure of the TSCH mode MAC. 2 Fast Synchronization scheduling The EBs used to advertise a TSCH network can be sent in the first slot of each slotframe. Once a mote receives an EB, it synchronizes to the sloted structure and starts sending on its own EBs in order to expand the network coverage. The frequency in which these frames are sent will change each time according to eq. 1.

3 Robust protocols for the Industrial Internet of Things 3 On the other side a new node that wants to join the network will be listening at only one of the n c h available frequencies. The frequency mismatch between the transmitter and the receiver, and collisions between EBs sent from neighboring motes can make the joining time of new motes to be very long. During the network formation, especially when the number of motes is consistent, a long joining time can be a serious obstacle for the deployment. A joining node before synchronization works with 100% duty cycle therefore the joining time can become also a relevant factor in energy consumption. In order to speed up the joining operations a solution is presented in [5]. Four different scheduling algorithms which regulate the EB transmission speed up the joining operations especially in high density networks. The algorithms purpose is to take advantage from each mote taking part in the network by appropriately scheduling beacon transmission of different nodes. It is defined a multi-slotframe structure in which every new mote will schedule its EB transmission. For each scheduled mote the corresponding cell will be occupied according to the used algorithm function. According to the way the scheduled slots are added (i.e, fill the corresponding position) to the general slotframe structure these algorithms have been called Random Vertical filling (RV), Random Horizontal filling (RH), Enhanced Coordinated Vertical filling (ECV) and Enhanced Coordinated Horizontal filling (ECH) (i.e, the red and yellow colored slots in the figure fig. 1). In the random algorithms the same S o f f (or c h o f f ) is used from every mote but they choose randomly the c h o f f (or S o f f ). In the coordinated versions it is used a collision avoidance mechanism and in addition if a mote has no energy limitation it can be scheduled to transmit in each slotframe. The algorithms have similar performance improvements but they offer different architectural choices. In addition the low computational complexity can make these algorithms very useful in the network setup phase. 3 Decentralized Traffic Aware Scheduling Algorithm (DeTAS) Once the network is set up new slots need to be scheduled to enable application data. From the quality of the schedule will depend many performance parameters of the network (i.e., data delay the energy efficiency, and the reliability of the transmissions), therefore it should be carefully designed. The Decentralized Traffic Aware Scheduling algorithm (DeTAS) proposed and experimentally evaluated in [6] aims to resolve the schedule in multihop sensor network where sensor data are sent toward a central server. In this algorithm transmission and reception slots are alternated and scheduled in consecutive slots. A node, in order to build the schedule will send to its preferred parent the information about its requirements (i.e. number of slots needed) and will receive from it the starting slotoffset. By alternating the transmission and reception slots there are avoided possible queue congestions, because after a message is received, there will always be a transmission slot that follows where it can be forwarded. The channel-offsets are calculated independently in each mote. Given K, the distance of a mote from the network coordinator in number of hops, the transmission channel-offset is equal to (K 2)mod(W ), where W is the number of channels used from DeTAS and it determines the distance in

4 4 Elvis Vogli Workshop: Authors Instructions number of hops after which the same channel will be reused. W should be at least 3 in order to avoid interferences. Whereas the reception channel-offset is equal to (K 1)mod(W ). This algorithm was implemented and evaluated using a testbed with TelosB sensor motes in different scenarios. The experimental results confirm a good performance in terms of duty cycle, end-to-end delay, end-to-end and link Packet Loss Ratio. 4 Security framework for networks The constrains in term of computational and storage capacity that characterize the devices in IoT pose serious limitations to security. The usual security mechanisms used in the normal Internet can not be used without being first adapted. The IEEE standard supports the possibility to protect MAC packets by using symmetric-key cryptography techniques and it offers several security options and most of the devices commercially available implement hardware encryption primitives. However the standard relies on upper layers to orchestrate the usage of the multitude of security profiles and configuration settings, as well as to handle the creation and the exchange of encryption keys. In support of this functionality, in [7] was defined a standard compliant security framework. A Key Management Protocol (KMP) is proposed in which each two motes negotiate a link key which is used for symmetric cryptography starting from a pre-shared Master Key. In addition to the KMP protocol it is defined a lightweight mechanism that initializes a secure IEEE domain. Experimental evaluation has shown that the enabling security features in constrained nodes requires relevant additional computational resources. This involves a not negligible growth of communication latencies. Such findings have to be carefully considered when designing and developing enhanced applications in future and secured Internet of Things (IoT) system. 5 Data interoperability of 6LoWPAN based networks in ETSI M2M. The protocol stack described in [3] provides efficiency and reliability as long as Internet connectivity. The devices implementing this stack can connect in the Internet and should be easily integrated in a more complex Machine to Machine (M2M) scenario. This however is not straight forward. If it is considered the European Telecommunications Standards Institute (ETSI) M2M communication standard, a problem rises from the fact that the resources are organized in a tree-like hierarchy [8]. ETSI M2M defines a middleware that follows RESTful architecture. Therefore the resources can be addressed using Uniform Resource Identifiers (URIs). As a consequence of the tree-like structure of the resources, the resulting URIs can become very long. In the case of a 6LoWPAN network long messages can be sent in multiple blocks (i.e., using blockwise transfer mode in CoAP). However URIs should be present in each message block and a long URI sometimes will not be even possible to fit in one packet because of the maximum size of a packet limited to 127

5 Robust protocols for the Industrial Internet of Things 5 bytes. Considering the various protocol headers even less bytes remain available to the application layer. A first solution to this problem is by mapping the ETSI M2M standard URIs to single byte URIs. This is possible because for each level of the tree there is a limited number of URIs. A second solution can be obtained using an intermediate proxy that relays in the border router. When a mote joins the M2M system it has to create and describe its resources by sending several long messages. These messages can be sent using CoAP blockwise operation but the subscription process would be very long due to the elevated number of blocks. This makes the first solution useful only for scenarios where the motes are stable in the network and the subscriptions are not frequent. Otherwise in scenarios with higher mobility the second solution can be used. 6 Conclusions The boom of IoT has created new opportunities and on the same time new challenges. An accurate design and optimization of the related protocols can make them more robust and reliable. Several issues of a Internet enabled protocol stack adopted in industrial domain have been analyzed so far. The solutions proposed fill some relevant gaps of the stack making it more reliable, energy efficient, secure and resolve some interoperability issues int M2M environments. However still more issues have to be considered. More robust and fault tolerant scheduling algorithms and more application scenarios need to be still evaluated. References 1. Atzori, L., Iera, A., Morabito, G.: The internet of things: A survey, Computer Networks, vol. 54, no. 15, pp , Elsevier, New York(2010) 2. Whitmore, A., Agarwal, A., Xu, L. D.: The Internet of things-a survey of topics and trends, Information Systems Frontiers, pp. 1-14, (2014) 3. Palattella, M., Accettura, N., Vilajosana, X., Watteyne, T., Grieco, L., Boggia, G., Dohler, M.: Standardized Protocol Stack for the Internet of (Important) Things, IEEE Communications Surveys & Tutorials, pp , (2013) 4. Watteyne, T., Vilajosana, X., Kerkez, B., Chraim, F., Weekly, K., Wang, Q. Glaser, S. D., Pister, K. S. J.: OpenWSN: a Standards-Based Low-Power Wireless Development Environment, Transactions on ETT, pp , Aug. (2012) 5. Vogli, E., Ribezzo, G., Grieco, L.A., Boggia, G.: Fast Join and Synchronization Schema in the IEEE e MAC, Submited to: IEEE WCNC Workshop - E2IoT 6. Accettura, N., Vogli, E., Pallatella M. R., Grieco, L. A., Boggia, G., Dohler, M.: Decentralized Traffic Aware Scheduling in 6TiSCH Networks: Design and Experimental Evaluation, submited to: IEEE Internet of Things Journal 7. Sciancalepore, S., Piro, G., Vogli, E., Boggia, G., Grieco, L. A.: On securing IEEE networks through a standard compliant framework, EuroMed Telco Conf Ben Alaya M., Banouar, Y., Monteil T., Chassot C., Drira K.: OM2M: Extensible ETSI-compliant {M2M} Service Platform with Self-configuration Capability, Procedia Computer Science, pp ,(2014)

Scheduling Enhanced Beacons in the IEEE 802.15.4e MAC for fast network formation

Scheduling Enhanced Beacons in the IEEE 802.15.4e MAC for fast network formation Scheduling Enhanced Beacons in the IEEE 802.15.4e MAC for fast network formation Elvis Vogli, Giuseppe Ribezzo, Luigi Alfredo Grieco, Gennaro Boggia Department of Electrical and Information Engineering

More information

www.mindteck.com 6LoWPAN Technical Overview

www.mindteck.com 6LoWPAN Technical Overview www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction

More information

Industrial IoT Applications using IEEE802.15.4e TSCH

Industrial IoT Applications using IEEE802.15.4e TSCH On Optimal Scheduling in Duty-Cycled 1 Industrial IoT Applications using IEEE802.15.4e TSCH Maria Rita Palattella, Nicola Accettura, Luigi Alfredo Grieco, Gennaro Boggia, Mischa Dohler and Thomas Engel

More information

IoT for surveillance applications!

IoT for surveillance applications! ! IoT for surveillance applications!! (and how to connect & schedule them)! EU-SEA workshop and cooperation on IoT and open platforms! January 25th, 2015!! IEEE RIVF 2015, Can Tho, Vietnam! Prof. Congduc

More information

A Non-beaconing ZigBee Network Implementation and Performance Study

A Non-beaconing ZigBee Network Implementation and Performance Study A Non-beaconing ZigBee Network Implementation and Performance Study Magnus Armholt Email: magnus.armholt@tut.fi Sakari Junnila Email: sakari.junnila@tut.fi Irek Defee Email: irek.defee@tut.fi Abstract

More information

Internet of Things based approach to Agriculture Monitoring

Internet of Things based approach to Agriculture Monitoring Internet of Things based approach to Agriculture Monitoring A. Paventhan ERNET India Regional Centre, Bangalore Asia-Pacific Advanced Network (APAN) 36th Meeting 20th August 2013 1 / 19 Outline 1 IP-based

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

On the Potential of Network Coding for Cooperative Awareness in Vehicular Networks

On the Potential of Network Coding for Cooperative Awareness in Vehicular Networks On the Potential of Network Coding for Cooperative Awareness in Vehicular Networks Miguel Sepulcre, Javier Gozalvez, Jose Ramon Gisbert UWICORE, Ubiquitous Wireless Communications Research Laboratory,

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City

Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City A. Lavric 1, V. Popa 2 PhD.,Computers, Department of Electronics and Automation,

More information

New Architectures for Ubiquitous Networks: Use and Adaptation of Internet Protocols over Wireless Sensor Networks

New Architectures for Ubiquitous Networks: Use and Adaptation of Internet Protocols over Wireless Sensor Networks Departament D Enginyeria Telemàtica PhD Dissertation New Architectures for Ubiquitous Networks: Use and Adaptation of Internet Protocols over Wireless Sensor Networks Doctorando Alessandro Ludovici Director

More information

D-MSR: A Distributed Network Management Scheme for Real-Time Monitoring and Process Control Applications in Wireless Industrial Automation

D-MSR: A Distributed Network Management Scheme for Real-Time Monitoring and Process Control Applications in Wireless Industrial Automation Sensors 2013, 13, 8239-8284; doi:10.3390/s130708239 Article OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors D-MSR: A Distributed Network Management Scheme for Real-Time Monitoring and Process

More information

Machine-to-Machine Technologies

Machine-to-Machine Technologies Machine-to-Machine Technologies Vision, Standards and Applications Mischa Dohler Coordinator of Research, CTTC Distinguished Lecturer, IEEE Editor-in-Chief, ETT BoD, Worldsensing Chair Professor, KCL (1

More information

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Anthony Kleerekoper 2nd year PhD Multi-Service Networks 2011 The Energy Hole Problem Uniform distribution of motes Regular,

More information

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)

More information

Architecting Information Centric ETSI-M2M systems

Architecting Information Centric ETSI-M2M systems Architecting Information Centric ETSI-M2M systems Luigi Alfredo Grieco, Mahdi Ben Alaya, Thierry Monteil and Khalil Drira LAAS-CNRS and Univ. de Toulouse, Toulouse, France. DEI, Politecnico di Bari, Bari,

More information

Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things

Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things Johanna Nieminen (Nokia), Future Internet SHOK preconference 30.05.2012 IoT Taxonomy ZigBee 802.5.4 Bluetooth Video RFID

More information

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand

More information

SBSCET, Firozpur (Punjab), India

SBSCET, Firozpur (Punjab), India Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based

More information

Journal of Chemical and Pharmaceutical Research, 2014, 6(3):723-728. Research Article

Journal of Chemical and Pharmaceutical Research, 2014, 6(3):723-728. Research Article Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(3):723-728 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research on heterogeneous network architecture between

More information

WBAN Beaconing for Efficient Resource Sharing. in Wireless Wearable Computer Networks

WBAN Beaconing for Efficient Resource Sharing. in Wireless Wearable Computer Networks Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 755-760 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4686 WBAN Beaconing for Efficient Resource Sharing in Wireless Wearable

More information

- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of

- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of An Asynchronous Neighbor Discovery Algorithm for Cognitive Radio Networks Short Paper Chanaka J. Liyana Arachchige, S. Venkatesan and Neeraj Mittal Erik Jonsson School of Engineering and Computer Science

More information

Energy Optimal Routing Protocol for a Wireless Data Network

Energy Optimal Routing Protocol for a Wireless Data Network Energy Optimal Routing Protocol for a Wireless Data Network Easwar Vivek Colloborator(s): Venkatesh Ramaiyan, Srikrishna Bhashyam Department of Electrical Engineering, Indian Institute of Technology, Madras.

More information

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network P. Shiva Kumar $, Rinki Sharma *, G.Varaprasad # $ Department of Information Technology Acharya Institute of Management and

More information

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,

More information

Performance Evaluation of The Split Transmission in Multihop Wireless Networks

Performance Evaluation of The Split Transmission in Multihop Wireless Networks Performance Evaluation of The Split Transmission in Multihop Wireless Networks Wanqing Tu and Vic Grout Centre for Applied Internet Research, School of Computing and Communications Technology, Glyndwr

More information

Analysis and Enhancement of QoS in Cognitive Radio Network for Efficient VoIP Performance

Analysis and Enhancement of QoS in Cognitive Radio Network for Efficient VoIP Performance Analysis and Enhancement of QoS in Cognitive Radio Network for Efficient VoIP Performance Tamal Chakraborty 1, Atri Mukhopadhyay 2 1 Dept. of Electronics and Telecommunication Engineering 2 School of Mobile

More information

IJMIE Volume 2, Issue 7 ISSN: 2249-0558

IJMIE Volume 2, Issue 7 ISSN: 2249-0558 Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)

More information

REDUCING PACKET OVERHEAD IN MOBILE IPV6

REDUCING PACKET OVERHEAD IN MOBILE IPV6 REDUCING PACKET OVERHEAD IN MOBILE IPV6 ABSTRACT Hooshiar Zolfagharnasab 1 1 Department of Computer Engineering, University of Isfahan, Isfahan, Iran hoppico@eng.ui.ac.ir hozo19@gmail.com Common Mobile

More information

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements

More information

Machine-to-Machine & Sensor Technologies in Smart Cities

Machine-to-Machine & Sensor Technologies in Smart Cities Machine-to-Machine & Sensor Technologies in Smart Cities Vision, Standards and Applications Mischa Dohler Coordinator of Research, CTTC Distinguished Lecturer, IEEE Editor-in-Chief, ETT BoD, Worldsensing

More information

A Fast Path Recovery Mechanism for MPLS Networks

A Fast Path Recovery Mechanism for MPLS Networks A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.

More information

Bluetooth Health Device Profile and the IEEE 11073 Medical Device Frame Work

Bluetooth Health Device Profile and the IEEE 11073 Medical Device Frame Work Bluetooth Health Device Profile and the IEEE 11073 Medical Device Frame Work Rudi Latuske, ARS Software GmbH 1. Bluetooth in Medical Applications Bluetooth, as a short range wireless technology, is very

More information

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0 LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does

More information

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks 1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity

More information

Thingsquare Technology

Thingsquare Technology Thingsquare Technology Thingsquare connects smartphone apps with things such as thermostats, light bulbs, and street lights. The devices have a programmable wireless chip that runs the Thingsquare firmware.

More information

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,

More information

SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS

SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS Sonia Waharte, Kevin Ritzenthaler and Raouf Boutaba University of Waterloo, School of Computer Science 00, University Avenue West,

More information

Internet of Things. Exam June 24

Internet of Things. Exam June 24 Internet of Things Exam June 24 Exercise 1 A personal area network (PAN) is composed of 100 motes and a PAN Coordinator. The PAN works in beacon- enabled mode. 50 motes of Type 1 are equipped with light

More information

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach

Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach U. Dillibabau 1, Akshay 2, M. Lorate Shiny 3 UG Scholars,

More information

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Beyond Limits... Volume: 2 Issue: 1 International Journal Of Advance Innovations, Thoughts & Ideas Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Shivani Koul* shivanikoul2@gmail.com

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY 4.1. INTRODUCTION In recent years, the rapid growth of wireless communication technology has improved the transmission data rate and communication distance.

More information

Dynamic Channel Allocation And Load Balancing With Sleep Scheduling In Manet

Dynamic Channel Allocation And Load Balancing With Sleep Scheduling In Manet International Journal of Science and Engineering Research (IJ0SER), Vol 3 Issue 9 September -2015 3221 5687, (P) 3221 568X Dynamic Channel Allocation And Load Balancing With Sleep Scheduling In Manet 1

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title High performance wireless wearable technologies for sports training and tele-health Author(s) Mediana

More information

SmartDiagnostics Application Note Wireless Interference

SmartDiagnostics Application Note Wireless Interference SmartDiagnostics Application Note Wireless Interference Publication Date: May 27, 2015 KCF Technologies, Inc. Background The SmartDiagnostics wireless network is an easy to install, end-to-end machine

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems

More information

An Experimental Study on Wireless Security Protocols over Mobile IP Networks

An Experimental Study on Wireless Security Protocols over Mobile IP Networks An Experimental Study on Wireless Security Protocols over Mobile IP Networks Avesh K. Agarwal Department of Computer Science Email: akagarwa@unity.ncsu.edu Jorinjit S. Gill Department of Electrical and

More information

Mobility Management Advanced

Mobility Management Advanced Mobility Management Advanced Summer Semester 2011 Integrated Communication Systems Group Ilmenau University of Technology Outline Motivation Mobility Management Approaches in the TCP/IP Reference Model

More information

An Overview of ZigBee Networks

An Overview of ZigBee Networks An Overview of ZigBee Networks A guide for implementers and security testers Matt Hillman Contents 1. What is ZigBee?... 3 1.1 ZigBee Versions... 3 2. How Does ZigBee Operate?... 3 2.1 The ZigBee Stack...

More information

Performance Monitoring and Control in Contention- Based Wireless Sensor Networks

Performance Monitoring and Control in Contention- Based Wireless Sensor Networks Performance Monitoring and Control in Contention- Based Wireless Sensor Networks Thomas Lindh #1, Ibrahim Orhan #2 # School of Technology and Health, KTH Royal Institute of Technology Marinens vag 30,

More information

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh

More information

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257 Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy

More information

Internet of Things. Laurent Toutain. June 11, 2013. Caen () IPv6 opérateur June 11, 2013 1 / 14

Internet of Things. Laurent Toutain. June 11, 2013. Caen () IPv6 opérateur June 11, 2013 1 / 14 Internet of Things Laurent Toutain June 11, 2013 Caen () IPv6 opérateur June 11, 2013 1 / 14 Internet of Things? Internet of Things Caen () IPv6 opérateur June 11, 2013 2 / 14 Internet of Things? Internet

More information

Software Defined Wireless Networks (SDWN): Unbridling SDNs

Software Defined Wireless Networks (SDWN): Unbridling SDNs Software Defined Wireless Networks (SDWN): Unbridling SDNs Leonardo Linguaglossa & thanks to Salvatore Costanzo, Laura Galluccio, Giacomo Morabito, Sergio Palazzo Università degli Studi di Catania Dipartimento

More information

A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems

A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems Workshop on Quality of Service in Geographically Distributed Systems A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication

More information

920MHz Band Multi-hop Wireless Network System

920MHz Band Multi-hop Wireless Network System 920MHz Band Multi-hop Wireless Network System Hiroshi Hashizume Motohiro Inokuma Masayuki Suto Shigeru Fukunaga Motoharu Kawanishi One policy aimed at the growth of OKI Group is the development of a smart

More information

Adaptive MAC Protocol for Emergency Data Transmission in Wireless Body Sensor Networks

Adaptive MAC Protocol for Emergency Data Transmission in Wireless Body Sensor Networks , pp. 205-216 http://dx.doi.org/10.14257/ijseia.2015.9.9.18 Adaptive MAC Protocol for Emergency Data Transmission in Wireless Body Sensor Networks Rae Hyun Kim and Jeong Gon Kim 1 Department of Electronic

More information

Wireless Sensor Networks Chapter 14: Security in WSNs

Wireless Sensor Networks Chapter 14: Security in WSNs Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks

More information

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

A NOVEL RESOURCE EFFICIENT DMMS APPROACH A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer

More information

How To Monitor Performance On Eve

How To Monitor Performance On Eve Performance Monitoring on Networked Virtual Environments C. Bouras 1, 2, E. Giannaka 1, 2 Abstract As networked virtual environments gain increasing interest and acceptance in the field of Internet applications,

More information

Wireless Mesh Networks under FreeBSD

Wireless Mesh Networks under FreeBSD Wireless Networks under FreeBSD Rui Paulo rpaulo@freebsd.org The FreeBSD Project AsiaBSDCon 2010 - Tokyo, Japan Abstract With the advent of low cost wireless chipsets, wireless mesh networks became much

More information

Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2

Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2 Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2 Sulaiman Khalifa Yakhlef, Ismail Shrena, Nasaraldian Ambark Shashoa Azzaytuna University, Faculty of Engineering Tarhuna

More information

A Routing Metric for Load-Balancing in Wireless Mesh Networks

A Routing Metric for Load-Balancing in Wireless Mesh Networks A Routing Metric for Load-Balancing in Wireless Mesh Networks Liang Ma and Mieso K. Denko Department of Computing and Information Science University of Guelph, Guelph, Ontario, Canada, N1G 2W1 email: {lma02;mdenko}@uoguelph.ca

More information

Securing MANET Using Diffie Hellman Digital Signature Scheme

Securing MANET Using Diffie Hellman Digital Signature Scheme Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2

More information

TDM services over IP networks

TDM services over IP networks Keyur Parikh Junius Kim TDM services over IP networks 1. ABSTRACT Time Division Multiplexing (TDM) circuits have been the backbone of communications over the past several decades. These circuits which

More information

6LoWPAN: An Open IoT Networking Protocol

6LoWPAN: An Open IoT Networking Protocol 6LoWPAN: An Open IoT Networking Protocol OpenIoT Summit 2016 San Diego Stefan Schmidt stefan@osg.samsung.com 1 6LoWPAN: An Open IoT Networking Protocol Open: Specified by the IETF Specifications available

More information

Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4

Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor

More information

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols

More information

OpenMTC. M2M Solutions for Smart Cities and the Internet of Things. www.open-mtc.org info@open-mtc.org

OpenMTC. M2M Solutions for Smart Cities and the Internet of Things. www.open-mtc.org info@open-mtc.org OpenMTC M2M Solutions for Smart Cities and the Internet of Things www.open-mtc.org info@open-mtc.org 2. March März 2, 2013 Understanding M2M Machine-to-Machine (M2M) is a paradigm in which the end-to-end

More information

Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study

Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study in IEEE 802.11 : A Prospective Study January 2011 Faculty of Engineering of the University of Porto Outline 1 Introduction 2 3 4 5 in IEEE 802.11 : A Prospective Study 2 / 28 Initial Considerations Introduction

More information

other. A B AP wired network

other. A B AP wired network 1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer

More information

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,

More information

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless

More information

CONECT - Cooperative Networking for High Capacity Transport Architectures Overview. Leandros Tassiulas CERTH

CONECT - Cooperative Networking for High Capacity Transport Architectures Overview. Leandros Tassiulas CERTH CONECT - Cooperative Networking for High Capacity Transport Architectures Overview Leandros Tassiulas CERTH CONECT Partnership Part No Participant name Short Name Country 1 Center for Reasearch and Technology

More information

Management of Telecommunication Networks. Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg

Management of Telecommunication Networks. Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg Management of Telecommunication Networks Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg Part 1 Quality of Services I QoS Definition ISO 9000 defines quality as the degree to which a set of inherent characteristics

More information

M2M I/O Modules. To view all of Advantech s M2M I/O Modules, please visit www.advantech.com/products.

M2M I/O Modules. To view all of Advantech s M2M I/O Modules, please visit www.advantech.com/products. M2M I/O Modules 14 M2M I/O Modules Overview 14-2 M2M I/O Modules Selection Guide 14-6 ADAM-2510Z Wireless Router Node 14-8 ADAM-2520Z Wireless Modbus RTU Gateway 14-9 ADAM-2031Z ADAM-2632Z ADAM-2017Z ADAM-2018Z

More information

RT-QoS for Wireless ad-hoc Networks of Embedded Systems

RT-QoS for Wireless ad-hoc Networks of Embedded Systems RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results

More information

Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks

Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks Mohammed A. Abdala & Alaa Mohammed Salih Department of Networks, College of Information Engineering, University

More information

CoHaRT: Deterministic Transmission of Large Data Amounts using CoAP and Kad

CoHaRT: Deterministic Transmission of Large Data Amounts using CoAP and Kad CoHaRT: Deterministic Transmission of Large Data Amounts using CoAP and Kad Jan Skodzik, Peter Danielis, Vlado Altmann, Bjoern Konieczek, Eike Bjoern Schweissguth, Frank Golatowski, Dirk Timmermann University

More information

Figure 1. The Example of ZigBee AODV Algorithm

Figure 1. The Example of ZigBee AODV Algorithm TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm

More information

Current Trends in Wireless Mesh Sensor Networks: A Review of Competing Approaches

Current Trends in Wireless Mesh Sensor Networks: A Review of Competing Approaches Sensors 2013, 13, 5958-5995; doi:10.3390/s130505958 Review OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Current Trends in Wireless Mesh Sensor Networks: A Review of Competing Approaches

More information

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Faiz Ahmed Electronic Engineering Institute of Communication Technologies, PTCL

More information

INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET-

INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET- ABSTRACT INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET- Bahidja Boukenadil¹ ¹Department Of Telecommunication, Tlemcen University, Tlemcen,Algeria Now in the world, the exchange of information between

More information

Introduction Chapter 1. Uses of Computer Networks

Introduction Chapter 1. Uses of Computer Networks Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

A Proxy Design to Leverage the Interconnection of CoAP Wireless Sensor Networks with Web Applications

A Proxy Design to Leverage the Interconnection of CoAP Wireless Sensor Networks with Web Applications Sensors 2015, 15, 1217-1244; doi:10.3390/s150101217 Article OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors A Proxy Design to Leverage the Interconnection of CoAP Wireless Sensor Networks

More information

ssumathy@vit.ac.in upendra_mcs2@yahoo.com

ssumathy@vit.ac.in upendra_mcs2@yahoo.com S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India ssumathy@vit.ac.in 2 School of Computing Sciences, VIT University, Vellore-632 014,

More information

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,

More information

G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418

G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418 An Analytical Model to evaluate the Approaches of Mobility Management 1 G.Vijaya Kumar, *2 A.Lakshman Rao *1 M.Tech (CSE Student), Pragati Engineering College, Kakinada, India. Vijay9908914010@gmail.com

More information

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions

More information

Key requirements for Interoperable IoT systems

Key requirements for Interoperable IoT systems Key requirements for Interoperable IoT systems Pratul Sharma Technical Marketing Manager, ARM Inc. May/08/2014 Agenda Why Interoperability? Open standards for interoperability Data Communication Standards

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of

More information

Virtual Machine in Data Center Switches Huawei Virtual System

Virtual Machine in Data Center Switches Huawei Virtual System Virtual Machine in Data Center Switches Huawei Virtual System Contents 1 Introduction... 3 2 VS: From the Aspect of Virtualization Technology... 3 3 VS: From the Aspect of Market Driving... 4 4 VS: From

More information

Network Mobility Support Scheme on PMIPv6 Networks

Network Mobility Support Scheme on PMIPv6 Networks Network Mobility Support Scheme on PMIPv6 Networks Hyo-Beom Lee 1, Youn-Hee Han 2 and Sung-Gi Min 1 1 Dept. of Computer Science and Engineering, Korea University, Seoul, South Korea. sgmin@korea.ac.kr

More information