19,574 research outputs found
MIPv6 Experimental Evaluation using Overlay Networks
The commercial deployment of Mobile IPv6 has been hastened by the concepts of Integrated
Wireless Networks and Overlay Networks, which are present in the notion of the
forthcoming generation of wireless communications. Individual wireless access networks
show limitations that can be overcome through the integration of different technologies
into a single unified platform (i.e., 4G systems). This paper summarises practical experiments
performed to evaluate the impact of inter-networking (i.e. vertical handovers) on
the Network and Transport layers. Based on our observations, we propose and evaluate a
number of inter-technology handover optimisation techniques, e.g., Router Advertisements
frequency values, Binding Update simulcasting, Router Advertisement caching, and Soft
Handovers. The paper concludes with the description of a policy-based mobility support
middleware (PROTON) that hides 4G networking complexities from mobile users, provides
informed handover-related decisions, and enables the application of different vertical
handover methods and optimisations according to context.Publicad
A survey on subjecting electronic product code and non-ID objects to IP identification
Over the last decade, both research on the Internet of Things (IoT) and
real-world IoT applications have grown exponentially. The IoT provides us with
smarter cities, intelligent homes, and generally more comfortable lives.
However, the introduction of these devices has led to several new challenges
that must be addressed. One of the critical challenges facing interacting with
IoT devices is to address billions of devices (things) around the world,
including computers, tablets, smartphones, wearable devices, sensors, and
embedded computers, and so on. This article provides a survey on subjecting
Electronic Product Code and non-ID objects to IP identification for IoT
devices, including their advantages and disadvantages thereof. Different
metrics are here proposed and used for evaluating these methods. In particular,
the main methods are evaluated in terms of their: (i) computational overhead,
(ii) scalability, (iii) adaptability, (iv) implementation cost, and (v) whether
applicable to already ID-based objects and presented in tabular format.
Finally, the article proves that this field of research will still be ongoing,
but any new technique must favorably offer the mentioned five evaluative
parameters.Comment: 112 references, 8 figures, 6 tables, Journal of Engineering Reports,
Wiley, 2020 (Open Access
- …