A Nueral Network-Based Mobile Architecture for Mobile Agents

Author(s):  
A. Kuppuswami

Wide area network (WAN) offers advantages like providing myriad services available on globally diversified computers with reasonably simple process. The ability to dynamically create networks offers the processing powers of various processors at our command. With the advent of protocols like SOAP and Web services, the consumption of services are more organized. In spite of various advances in communication techniques, the consumption of services through mobile gadgets is still only at the research level. The major impedances in implementing such systems on a mobile network are the latency factor, abrupt disconnection in service, lower bandwidth and minimal processing power. The mobile agent’s paradigm proves to be an effective solution to various issues raised. It has received serious attention in the last decade and several systems based on this paradigm have been proposed and built. All such systems have been designed for a static network, where the service providers and the requestors are connected to the server on a permanent basis. This chapter presents a new framework of managing the mobile environment and the participating nodes with active intelligent migration. The functioning of the mobile agents in such a scenario is also presented.

2009 ◽  
pp. 618-629
Author(s):  
Anand Kuppuswami

Wide area network (WAN) offers advantages like providing myriad services available on globally diversified computers with reasonably simple process. The ability to dynamically create networks offers the processing powers of various processors at our command. With the advent of protocols like SOAP and Web services, the consumption of services are more organized. In spite of various advances in communication techniques, the consumption of services through mobile gadgets is still only at the research level. The major impedances in implementing such systems on a mobile network are the latency factor, abrupt disconnection in service, lower bandwidth and minimal processing power. The mobile agent’s paradigm proves to be an effective solution to various issues raised. It has received serious attention in the last decade and several systems based on this paradigm have been proposed and built. All such systems have been designed for a static network, where the service providers and the requestors are connected to the server on a permanent basis. This chapter presents a new framework of managing the mobile environment and the participating nodes with active intelligent migration. The functioning of the mobile agents in such a scenario is also presented.


Author(s):  
Mohammad Istiak Hossain ◽  
Jan I. Markendahl

AbstractSmall-scale commercial rollouts of Cellular-IoT (C-IoT) networks have started globally since last year. However, among the plethora of low power wide area network (LPWAN) technologies, the cost-effectiveness of C-IoT is not certain for IoT service providers, small and greenfield operators. Today, there is no known public framework for the feasibility analysis of IoT communication technologies. Hence, this paper first presents a generic framework to assess the cost structure of cellular and non-cellular LPWAN technologies. Then, we applied the framework in eight deployment scenarios to analyze the prospect of LPWAN technologies like Sigfox, LoRaWAN, NB-IoT, LTE-M, and EC-GSM. We consider the inter-technology interference impact on LoRaWAN and Sigfox scalability. Our results validate that a large rollout with a single technology is not cost-efficient. Also, our analysis suggests the rollout possibility of an IoT communication Technology may not be linear to cost-efficiency.


Electronics ◽  
2021 ◽  
Vol 10 (18) ◽  
pp. 2224
Author(s):  
Stephen Ugwuanyi ◽  
Greig Paul ◽  
James Irvine

Recently, Internet of Things (IoT) deployments have shown their potential for aiding the realisation of the Sustainable Development Goals (SDGs). Concerns regarding how the IoT can specifically drive SDGs 6, 11 and 9 in developing countries have been raised with respect to the challenges of deploying licensed and unlicensed low-power wide area network (LPWAN) IoT technologies and their opportunities for IoT consumers and service providers. With IoT infrastructure and protocols being ubiquitous and each being proposed for different SDGs, we review and compare the various performance characteristics of LoRaWAN and NB-IoT networks. From the performance analysis of our networks, NB-IoT, one of the standardised promising cellular IoT solutions for developing countries, is more expensive and less energy-efficient than LoRaWAN. Utilising the same user equipment (UE), NB-IoT consumed an excess of 2 mAh of power for joining the network and 1.7 mAh more for a 44-byte uplink message compared to LoRaWAN. However, NB-IoT has the advantage of reliably and securely delivering higher network connection capacity in IoT use cases, leveraging existing cellular infrastructure. With a maximum throughput of 264 bps at 837 ms measured latency, NB-IoT outperformed LoRaWAN and proved robust for machine-type communications. These findings will help IoT consumers and service providers understand the performance differences and deployment challenges of NB-IoT and LoRaWAN and establish new research directions to tackle IoT issues in developing countries. With Nigeria as a case study, for consumers and organisations at a crossroads in their long-term deployment decisions, the proposed LPWAN integrated architecture is an example of the deployment opportunities for consumer and industrial IoT applications in developing countries.


2021 ◽  
Author(s):  
Hajer Tounsi ◽  
Norhane Benkahla ◽  
Ye-Qiong Song ◽  
Mounir Frikha

Abstract Long Range Wide Area Network (LoRaWAN) enables flexible long-range communication with low power consumption which is suitable for IoT applications. LoRaWAN’s performance is due on the one hand to its spreading factor modulation allowing the spread out of communication between end-devices and gateways on different frequency channels and data rates. And on the other hand, to the ability to manage for each node its data rate and its transmission power thanks to the adaptive data rate (ADR) scheme in order to increase the overall network capacity and to maximize the battery life of end devices. However, because of the Aloha access technique adopted by LoRaWAN, the risk of using the same data rate on the same channel is not negligible. Despite the limitation of the duty cycle for each node, the risk of collision is high with the increase of the number of end devices which degrades the LoRaWAN’s performance. In this context, our paper proposes different approaches to improve the performance of LoRaWAN. The first contribution consists in improving the ADR technique to meet the characteristics of a mobile environment. The new mechanism proposed, called VHMM-based E-ADR, consists of adapting the data rate of the end-device according to its position. The second contribution consists in better managing the use of the duty cycle by proposing a dynamic sharing mechanism (Dynamic Duty-Cycle). The last contribution consists in proposing a deterministic access technique to replace Aloha. Our experimental study has shown that our proposals give better results in terms of Packet Delivery Ratio (PDR) and energy consumption than basic LoRaWAN in a mobile environment.


Author(s):  
Eisha Akanksha

The internet of things (IoT) brings ‘life' to non-living things. In the IoT frameworks, the devices become smarter, more intelligent, become able to make decisions, and can communicate with other entities, applications, as well as human beings. According to a Gartner report, by 2020 more than 25 billion devices will be connected to the internet. Low power wireless wide area network (LPWAN) is a group of various low power, wide-area technologies such as LoRa, Sigfox, NB-IoT, DASH7, RPMA, LTE-M, designed to interconnect low bandwidth, battery-operated devices having limited processing power, limited memory, transmission speed with low bit rates at long-range using radio communication technologies. Most of these technologies provide a long battery life, low deployment cost, large capacity, and generates deeper insights of businesses. However, each technology differs in latency, data rate, handover mechanisms, quality of services, applications, and use cases. In this chapter, the authors provide the basic principles of these LPWANs and present their applications in different domains.


Author(s):  
Anand Kuppuswami

Mobile agents and framework built on mobile agents have been the key research area for the past few years. The major impedances like latency factor, abrupt disconnection in service, and minimal processing power, were solved in the mobile agent paradigm. Also, with the advent of intelligent framework of mobile agents, mobile agents were empowered with decision making powers and were able to roam the network in search of the best service provider. This further increased the efficiency of the system and reduced the system outage time. Although the system projected itself as the ideal solution to the real-world problems, it could not be implemented in commercial applications. This is attributed to the lack of sessions in the mobile agent’s environment. Predominantly in the mobile agents paradigm architecture was still the client-server architecture. In this chapter the framework has been extended to incorporate transaction capabilities to the mobile agents. This would enable them to perform a full transaction and complete a workflow. We present the scenario of Customer Relationship Management (CRM) where the framework could be put to use.


Sensors ◽  
2019 ◽  
Vol 19 (2) ◽  
pp. 254 ◽  
Author(s):  
Adam Drenoyanis ◽  
Raad Raad ◽  
Ivan Wady ◽  
Carmel Krogh

Critical wastewater events such as sewer main blockages or overflows are often not detected until after the fact. These events can be costly, from both an environmental impact and monetary standpoint. A standalone, portable radar device allowing non-invasive benchmarking of sewer pumping station (SPS) pumps is presented. Further, by configuring and deploying a complete Low Power Wide Area Network (LPWAN), Shoalhaven Water (SW) now has the opportunity to create “Internet of Things” (IoT)-capable devices that offer freedom from the reliance on mobile network providers, whilst avoiding congestion on the existing Supervisory Control and Data Acquisition (SCADA) telemetry backbone. This network infrastructure allows for devices capable of real-time monitoring to alert of any system failures, providing an effective tool to proactively capture the current state of the sewer network between the much larger SPSs. This paper presents novel solutions to improve the current wastewater network management procedures employed by SW. This paper also offers a complete review of wastewater monitoring networks and is one of the first to offer robust testing of Long Range Wide Area Network (LoRaWAN) network capabilities in Australia. The paper also provides a comprehensive summary of the LoRa protocol and all its functions. It was found that a LPWAN, utilising the LoRaWAN protocol and deployed appropriately within a geographic area, can attain maximum transmission distances of 20 km within an urban environment and up to 35 km line of sight.


Author(s):  
Abdullah Marich Ali Abdullah Marich Ali

Automatic means to manage the security in moderate and large networks are of extreme importance to avoid error-prone manual techniques. This paper paves the way to develop an automatic network security management (NSM) system that is both flexible in deciding the system’s objectives and efficient in using the valuable network bandwidth with a relatively low transmission overhead. The required flexibility and efficiency are obtained using mobile agents (MA) to collect the required security information from various network components and devices, and using ontology to specify the required security policies in such a way understandable by the MA’s software. A simplified NSM prototype is developed, implemented, and tested over a typical local area network to investigate the validity of the suggested ideas. The MA travels through the network and collects the necessary information using an ontology-based security policy. Next, it may either return back to the network administrator to let him decide and perform the suitable actions, or alternatively the MA may take the appropriate decisions. This prototype is tested to examine its functionality and performance using a simple local area network consisting of three computers with different configurations. The developed MA was able to understand the ontology and move around the network. It has properly detected the components that are wrongly configured. It should be made clear that the design is scalable and can be directly applied to more computers in a local area network or even in a wide area network.


Sign in / Sign up

Export Citation Format

Share Document