7 research outputs found

    Session Continuity in Heterogeneous Networks: A SIP-based Proactive Handover Scheme

    Get PDF
    Today, the computation power and storage capability on mobile devices are increasing rapidly, and together with new interactive services this creates a demand for more bandwidth. To keep track of this evolution, the use of heterogeneous networks has gained focus. Instead of only using one type of network, it is desired to utilize all carriers available on a device, and hence choose the one best suited. This thesis describes and discusses different approaches to session continuity. The different solutions include Mobile IP, Generic Access Networks (GAN), and proposals based on the Session Initiation Protocol (SIP). Current solutions are not satisfactory in the terms of handover delay, and hence best suited for non-realtime applications. Furthermore it is proposed an application-layer handover scheme for session continuity in heterogeneous networks, which will significantly reduce the handover time. This handover scheme has been implemented, and tests show that the handover time is significantly reduced. Keywords: Session Continuity, Handover, Heterogeneous Networks, SIP, VoIP, GAN

    A 3d Real-Time Monitoring System for a Production Line

    Get PDF
    It is hypothesized than a transparent view of the factory floor, in real time, will provide grounds for achieving a better control over the factory assets, including maintenance activities and scheduling optimization. The main goal of this research is to provide a Real-Time 3D Monitoring of manufacturing systems by capitalizing the early 3D model created for simulation proposes and the eventualized information offered by the Factory Information Systems in the shape of web services via DPWS. In addition the monitoring application should be accessible via a web-based application allowing multi-viewers on multi-platform, including mobile ones. The thesis discusses the background of Factory Monitoring and Visualization Systems, including 3D Modeling and Animation, and Web-based Applications. Then a robotized assembly line located at FAST-Lab. is presented for been used as the test bed of the implementation by the designed System. CATIA and DELMIA Software model the 3D view of the line assets. A method for importing to Unity3d Software is also developed and documented. The Unity Game engine produces the animation of the 3D models. Then, the Application is published as a web-based application running under Unity browser plugin. Lastly, an interface for the communication of the 3D virtual world and the line Sensors and Data Acquisition application is presented in order to achieve the Real-Time triggering of the events driven the 3D virtual representation of the assembly line

    The Internet of Everything

    Get PDF
    In the era before IoT, the world wide web, internet, web 2.0 and social media made people’s lives comfortable by providing web services and enabling access personal data irrespective of their location. Further, to save time and improve efficiency, there is a need for machine to machine communication, automation, smart computing and ubiquitous access to personal devices. This need gave birth to the phenomenon of Internet of Things (IoT) and further to the concept of Internet of Everything (IoE)

    The Internet of Everything

    Get PDF
    In the era before IoT, the world wide web, internet, web 2.0 and social media made people’s lives comfortable by providing web services and enabling access personal data irrespective of their location. Further, to save time and improve efficiency, there is a need for machine to machine communication, automation, smart computing and ubiquitous access to personal devices. This need gave birth to the phenomenon of Internet of Things (IoT) and further to the concept of Internet of Everything (IoE)

    Quality of Service for Multimedia and Control System Applications in Mobile Ad-hoc Network

    Get PDF
    A Mobile Ad-Hoc Network (MANET) is a collection of randomly distributed infrastructure-less mobile nodes that form a wireless network. These Mobile nodes have the capability to act as a host or relay. As a host, the mobile nodes can be the source and/or destination of traffic, and when acting as a relay, they can be an intermediate node that forwards the traffic to its destination. Some of the challenges of a MANET include the dynamic network topology, device discovery, power constraints, wireless channel conditions and limited network resources. These challenges degrade the network performance and thus affect the network stability and robustness. Therefore, it is difficult for a MANET to attain the Quality of Service (QoS) of a wired network. This thesis aims to address the problem of the limited wireless network resources by proposing two adaptive scheduling algorithms that can adapt in real-time to the changes in the network. To achieve the aim; this thesis first analyses the behaviour of various application profiles in a queue. It models Voice, Email, and Internet Browsing traffic (by specifying packet sizes, and inter-arrival rates based on various distributions) separately and then simultaneously in a common network for uncongested and congested conditions, after which scheduling is applied in order to improve the overall network performance. The Voice traffic profile is then added to the UDP/IP protocol stack and the network performance is compared to a simple node without the UDP/IP protocol stack. A realistic wireless propagation model for the simulation is developed from a point-to-point open-field outdoor experiment. This thesis proposes two adaptive priority fuzzy based scheduler for a MANET, the priority of packets in the queue are determined based on the real-time available network resources. The methodology for transmitting a live-feed video stream over OPNET to validate the scheduler is also presented. An interface between the simulation and hardware is created to send real-time video traffic through the simulation network. This thesis concludes by showing that the performance of a MANET network can be improved by applying an adaptive scheduler

    Formal analysis of confidentiality conditions related to data leakage

    Get PDF
    The size of the financial risk, the social repercussions and the legal ramifications resulting from data leakage are of great concern. Some experts believe that poor system designs are to blame. The goal of this thesis is to use applied formal methods to verify that data leakage related confidentiality properties of system designs are satisfied. This thesis presents a practically applicable approach for using Banks's confidentiality framework, instantiated using the Circus notation. The thesis proposes a tool-chain for mechanizing the application of the framework and includes a custom tool and the Isabelle theorem prover that coordinate to verify a given system model. The practical applicability of the mechanization was evaluated by analysing a number of hand-crafted systems having literature related confidentiality requirements. Without any reliable tool for using BCF or any Circus tool that can be extended for the same purpose, it was necessary to build a custom tool. Further, a lack of literature related descriptive case studies on confidentiality in systems compelled us to use hand-written system specifications with literature related confidentiality requirements. The results of this study show that the tool-chain proposed in this thesis is practically applicable in terms of time required. Further, the efficiency of the proposed tool-chain has been shown by comparing the time taken for analysing a system both using the mechanised approach as well as the manual approach
    corecore