scholarly journals Cyber-physical networking for wireless mesh infrastructures

2012 ◽  
Vol 10 ◽  
pp. 113-118
Author(s):  
C. Mannweiler ◽  
C. Lottermann ◽  
A. Klein ◽  
J. Schneider ◽  
H. D. Schotten

Abstract. This paper presents a novel approach for cyber-physical network control. "Cyber-physical" refers to the inclusion of different parameters and information sources, ranging from physical sensors (e.g. energy, temperature, light) to conventional network information (bandwidth, delay, jitter, etc.) to logical data providers (inference systems, user profiles, spectrum usage databases). For a consistent processing, collected data is represented in a uniform way, analyzed, and provided to dedicated network management functions and network services, both internally and, through an according API, to third party services. Specifically, in this work, we outline the design of sophisticated energy management functionalities for a hybrid wireless mesh network (WLAN for both backhaul traffic and access, GSM for access only), disposing of autonomous energy supply, in this case solar power. Energy consumption is optimized under the presumption of fluctuating power availability and considerable storage constraints, thus influencing, among others, handover and routing decisions. Moreover, advanced situation-aware auto-configuration and self-adaptation mechanisms are introduced for an autonomous operation of the network. The overall objective is to deploy a robust wireless access and backbone infrastructure with minimal operational cost and effective, cyber-physical control mechanisms, especially dedicated for rural or developing regions.

2011 ◽  
Vol 403-408 ◽  
pp. 2697-2703
Author(s):  
Hua Mei Qi ◽  
Min Wu ◽  
Zhi Gang Chen

Motivated by the advantage of the gateway that acts as the performance bottleneck in wireless mesh networks (WMNs) while shaping the traffic with the greedy fractal shaper, a novel approach is proposed to derive the upper stochastic/statistical bound of the backlog, delay and delay jitter of the WMNs gateway quality of service (QoS) statistic bound model. By analyzing and evaluating the QoS performance of the present model based on network calculus theory with fair bandwidth distributed strategy, a number of useful curves are achieved. Simulation shows the performance of the present model.


2012 ◽  
Vol 63 (5) ◽  
pp. 322-327 ◽  
Author(s):  
Dong Huang ◽  
Bigui He

Network control system (NCS) has been presenting significance in industry and automation by supporting usability and convenience. However, for insufficiency for diversity of infrastructure and scalability, it has limitations in the field of flexibility for network architecture compared to the wireless mobile network. Hence, there shows the pressing need for tackling the existing network control system with control flow by wireless mesh network (WMN) with strong flexibility effectively. Consequently, for each control system, its stability is one of the prerequisites and criteria. In this paper, a novel optimization model was developed for planning the optimal resource utilization of wireless mesh network (WMN), and then the dynamic characteristics of mesh-based network control system are analyzed and discussed.


Author(s):  
A. Rethina Palin ◽  
I. Jeena Jacob

Wireless Mesh Network (MWN) could be divided into proactive routing, reactive routing and hybrid routing, which must satisfy the requirements related to scalability, reliability, flexibility, throughput, load balancing, congestion control and efficiency. DMN (Directional Mesh Network) become more adaptive to the local environments and robust to spectrum changes. The existing computing units in the mesh network systems are Fog nodes, the DMN architecture is more economic and efficient since it doesn’t require architecture- level changes from existing systems. The cluster head (CH) manages a group of nodes such that the network has the hierarchical structure for the channel access, routing and bandwidth allocation. The feature extraction and situational awareness is conducted, each Fog node sends the information regarding the current situation to the cluster head in the contextual format. A Markov logic network (MLN) based reasoning engine is utilized for the final routing table updating regarding the system uncertainty and complexity.


2012 ◽  
Vol 3 (3) ◽  
pp. 368-374
Author(s):  
Usha Kumari ◽  
Udai Shankar

IEEE 802.16 based wireless mesh networks (WMNs) are a promising broadband access solution to support flexibility, cost effectiveness and fast deployment of the fourth generation infrastructure based wireless networks. Reducing the time for channel establishment is critical for low latency/interactive Applications. According to IEEE 802.16 MAC protocol, there are three scheduling algorithms for assigning TDMA slots to each network node: centralized and distributed the distributed is further divided into two operational modes coordinated distributed and uncoordinated distributed. In coordinated distributed scheduling algorithm, network nodes have to transmit scheduling message in order to inform other nodes about their transfer schedule. In this paper a new approach is proposed to improve coordinated distributed scheduling efficiency in IEEE 802.16 mesh mode, with respect to three parameter Throughput, Average end to end delay and Normalized Overhead. For evaluating the proposed networks efficiency, several extensive simulations are performed in various network configurations and the most important system parameters which affect the network performance are analyzed


Network ◽  
2021 ◽  
Vol 1 (2) ◽  
pp. 75-94
Author(s):  
Ed Kamya Kiyemba Edris ◽  
Mahdi Aiash ◽  
Jonathan Loo

Fifth Generation mobile networks (5G) promise to make network services provided by various Service Providers (SP) such as Mobile Network Operators (MNOs) and third-party SPs accessible from anywhere by the end-users through their User Equipment (UE). These services will be pushed closer to the edge for quick, seamless, and secure access. After being granted access to a service, the end-user will be able to cache and share data with other users. However, security measures should be in place for SP not only to secure the provisioning and access of those services but also, should be able to restrict what the end-users can do with the accessed data in or out of coverage. This can be facilitated by federated service authorization and access control mechanisms that restrict the caching and sharing of data accessed by the UE in different security domains. In this paper, we propose a Data Caching and Sharing Security (DCSS) protocol that leverages federated authorization to provide secure caching and sharing of data from multiple SPs in multiple security domains. We formally verify the proposed DCSS protocol using ProVerif and applied pi-calculus. Furthermore, a comprehensive security analysis of the security properties of the proposed DCSS protocol is conducted.


Sign in / Sign up

Export Citation Format

Share Document