Research on Integration of Heterogeneous Wireless Access Communication Networks

Author(s):  
Yu Liu
Author(s):  
Hervé Rivano ◽  
Isabelle Augé-Blum ◽  
Walid Bechkit ◽  
Khaled Boussetta ◽  
Marco Fiore ◽  
...  

Smart cities are envisioned to enable a vast amount of services in urban environments, so as to improve mobility, health, resource management, and, generally speaking, citizens' quality of life. Most of these services rely on pervasive, seamless and real-time access to information by users on the move, as well as on continuous exchanges of data among millions of devices deployed throughout the urban surface. It is thus clear that communication networks will be the key to enabling smart city solutions, by providing their core support infrastructure. In particular, wireless technologies will represent the main tool leveraged by such an infrastructure, as they allow device mobility and do not have the deployment constraints of wired architectures. In this Chapter, we present different wireless access networks intended to empower future smart cities, and discuss their features, complementarity and interoperability.


Author(s):  
El-Sayed M. El-Alfy ◽  
Wasan Shaker Awad

The evolution of communication networks and information systems, to support wireless access, cloud and grid computing, and big data, provides great business opportunities. However, it also generates a new trend of sophisticated network threats and offers several challenges in securing information and systems confidentiality, integrity and availability. The traditional techniques used by security experts are mostly static and lack the much needed characteristics of adaptation and self-organization, computational efficiency and error resilience to deal with evolving attacks. The inherent characteristics of computational intelligence (CI) paradigms provide a promising alternative that has gained popularity resulting in significant applications in information security. There is a plethora of CI paradigms commonly used in this domain including artificial neural networks, evolutionary computing, fuzzy systems, and swarm intelligence. This chapter provides an overview of the widely-recognized CI paradigms and shades the light on some of their potential applications in information security.


Author(s):  
El-Sayed M. El-Alfy ◽  
Wasan Awad

The evolution of communication networks and information systems, to support wireless access, cloud and grid computing, and big data, provides great business opportunities. However, it also generates a new trend of sophisticated network threats and offers several challenges in securing information and systems confidentiality, integrity and availability. The traditional techniques used by security experts are mostly static and lack the much needed characteristics of adaptation and self-organization, computational efficiency and error resilience to deal with evolving attacks. The inherent characteristics of computational intelligence (CI) paradigms provide a promising alternative that has gained popularity resulting in significant applications in information security. There is a plethora of CI paradigms commonly used in this domain including artificial neural networks, evolutionary computing, fuzzy systems, and swarm intelligence. This chapter provides an overview of the widely-recognized CI paradigms and shades the light on some of their potential applications in information security.


2017 ◽  
pp. 476-507 ◽  
Author(s):  
Hervé Rivano ◽  
Isabelle Augé-Blum ◽  
Walid Bechkit ◽  
Khaled Boussetta ◽  
Marco Fiore ◽  
...  

Smart cities are envisioned to enable a vast amount of services in urban environments, so as to improve mobility, health, resource management, and, generally speaking, citizens' quality of life. Most of these services rely on pervasive, seamless and real-time access to information by users on the move, as well as on continuous exchanges of data among millions of devices deployed throughout the urban surface. It is thus clear that communication networks will be the key to enabling smart city solutions, by providing their core support infrastructure. In particular, wireless technologies will represent the main tool leveraged by such an infrastructure, as they allow device mobility and do not have the deployment constraints of wired architectures. In this Chapter, we present different wireless access networks intended to empower future smart cities, and discuss their features, complementarity and interoperability.


2001 ◽  
Vol 89 (1) ◽  
pp. 58-75 ◽  
Author(s):  
R. Becher ◽  
M. Dillinger ◽  
M. Haardt ◽  
W. Mohr

Author(s):  
Sotiris Karabetsos ◽  
Spiros Mikroulis ◽  
Athanase Nassiopoulos

The high capacity offered by the optical fiber, combined with the mobility and the flexibility of wireless access, either fixed or not, provides an efficient approach to alleviating the requirements posed by the envisaged provision of any-service, anytime and anywhere, next generation communication networks. The objective of this chapter is to present an overview of Radio-over-Fiber technology, as an emerging infrastructure for next generation, fiber-based, wireless access broadband networking. In particular, the fundamental concept of Radio-over-Fiber technology is reviewed and the partial components comprising it are discussed. Furthermore, the associated architectures are depicted and a short literature survey of trends and applications is considered.


Electronics ◽  
2020 ◽  
Vol 9 (9) ◽  
pp. 1349
Author(s):  
So-Yong Kim ◽  
Cheol-Min Kim ◽  
Seok-Joo Koh

Visible Light Communication (VLC) has been noted as an emerging technology for communications in wireless local area networks. VLC provides some distinctive features over the conventional wireless access technologies, such as Wi-Fi, Bluetooth, or ZigBee. The most prominent feature of VLC is that it can provide more exact location information, since it is based on a particular light. In addition, VLC can reduce the frequency interferences from numerous wireless channels, since it uses a completely different radio frequency channel from the conventional wireless access technologies. Thus, VLC can be used for Internet-of-Things (IoT) services. Nevertheless, up to now, not enough studies on how to provide IoT services over VLC networks have been conducted. In this paper, we propose a framework to provide IoT services in VLC networks. In particular, we will consider the unidirectional VLC network, in which the downlink channel from the VLC transmitter to the VLC receiver is given by using VLC communication, whereas the uplink channel from the VLC receiver to the VLC transmitter is implemented by using another wireless access technology, such as Wi-Fi. This is because most of the VLC receivers, such as mobile phones, cannot support the uplink VLC communication. Based on the framework of IoT services over unidirectional VLC, in this paper, we also propose the VLC–IoT protocol (VIP) which is an application layer protocol for data transport with the session management functionality that can be used to effectively provide IoT services among IoT servers, VLC transmitters and VLC receivers in the networks. The proposed VIP protocol is implemented by using the Cooja simulator. For performance analysis, the proposed scheme is compared with the existing CoAP-based scheme that does not provide the session management. From a variety of simulation experiments, we see that the proposed scheme can provide lower data transmission and handover delays, compared to the existing scheme.


Sign in / Sign up

Export Citation Format

Share Document