scholarly journals Review Paper on Networking Issue of Internet of Things (IOT)

Author(s):  
Rashmi SK ◽  
Swathi RN ◽  
Vaishnavi AS ◽  
Nekkanti Deepak

The Internet was initially used to transfer data packets between users and data sources with a specific IP address. Due to advancements, the Internet is being used to share data among different small, resource constrained devices connected in billions to constitute the (IOT) Internet of things .In addition, the paper discusses about wireless LAN Wi-Fi technology i.e. wireless local area network protocol and on a larger scale, mobile communication technology, that is used to provide connectivity to the internet, the wide area network. The paper draws an attention towards the background of IOT and its distinction with other technologies, discussion on network optimization in IOT. This paper not only reviews, compares and consolidates the recent related works, but also admires the author’s findings, solutions and discusses its usefulness towards network optimization in IOT. The uniqueness of this paper lies in the review of network optimization issues and challenges in IOT. In this paper, a comprehensive survey on the network optimization in IOT is presented.

2019 ◽  
Vol 4 (2) ◽  
pp. 60-67
Author(s):  
Mohd Mirza Abdul Malik ◽  
Mohd Nizam Osman ◽  
Mushahadah Maghribi

In this ever-growing wireless technology era, the number of Open Wireless Local Area Network (WLAN) are on the rise. From cafes to shopping areas, most of them offer users with a free-to-use WLAN which popularly known as Open Wi-Fi or Wi-Fi Hotspots. Although it is a convenient for them to access the Internet at these places, later they know it also makes them a vulnerable target for attackers that might be lurking in the same network they are connected. Therefore, a Hybrid IDS that combines both SNORT, a network-based IDS (NIDS) and OSSEC, a host-based IDS (HIDS) was developed to curb the problem. NIDS was used to monitor network traffics while HIDS monitor user’s system for any suspicious activities. Then, a system that can control and manage both IDS in the much easier and simpler way was developed using Python programming language. The system then can generate alerts with the help of both IDS to notify users for any suspicious activities that might occur in the network or user’s system. Several attacks were launched from the attacker’s laptop to test whether Hybrid IDS can generate alerts to notify the victim. As a result, the system breeze through the testing phase by showing necessary output. All the results were taken and then compared with other scenarios to determine whether they can give the same results as Hybrid IDS. From the comparison results, it can be said that Hybrid IDS can give the extra protection layer towards Open Wi-Fi users. Therefore, the Hybrid IDS was proven to provide vast tracking detection for suspicious activity in the network environments by monitor and alert the users about malicious activities.  


Jurnal Teknik ◽  
2018 ◽  
Vol 7 (1) ◽  
Author(s):  
Heru Abrianto

Microstrip antenna which designed with dual feeding at 2.4 GHz and 5.8 GHz can meet WLAN (Wireless Local Area Network) application.Antenna fabrication use PCB FR4 double layer with thickness 1.6 mm and dielectric constant value 4.4. The length of patch antenna according to calculation 28.63 mm, but to get needed parameter length of patch should be optimized to 53 mm. After examination, this antenna has VSWR 1.212 at 2.42 GHz and 1.502 at 5.8 GHz, RL -13.94 dB at 2.42 GHz and -20.357 dB at 5.8 GHz, gain of antenna 6.16 dB at 2.42 GHz and 6.91 dB at 5.8 GHz, the radiation pattern is bidirectional. Keywords : microstrip antenna, wireless LAN, dual polarization, single feeding technique


2013 ◽  
Vol 278-280 ◽  
pp. 582-585
Author(s):  
Rong Gao ◽  
Qi Sheng Wu ◽  
Lan Bai

A tms320dm642 and wireless fidelity based fire monitoring robot is designed. Flame features, both static and dynamic detecting algorithm, combine with long wave infrared (LWIR) is equipped to achieve the goal of monitoring fire. When the suspected fire event happens, Fire warning message will be sent to remote terminal through the wireless LAN automatically. Infrared image of the fire can be transmitted through the wireless network under the control of remote terminal. As LWIR camera can even look through the dense smoke of fire, fire source will be located accurately, rescuing and fire fighting work will carry on better and with less injury.


2009 ◽  
Vol 10 (2) ◽  
pp. 167-184
Author(s):  
Jaime Sánchez-García ◽  
◽  
Luis A. Villaseñor-González ◽  
Mario E. Vaquera-Flores ◽  
Raúl Aquino-Santos ◽  
...  

2015 ◽  
Vol 2015 ◽  
pp. 1-11
Author(s):  
Chang-Seop Park ◽  
Hyun-Sun Kang ◽  
Jaijin Jung

A new key management and security scheme is proposed to integrate Layer Two (L2) and Layer Three (L3) keys for secure and fast Mobile IPv6 handover over IEEE 802.11 Wireless Local Area Network (WLAN). Unlike the original IEEE 802.11-based Mobile IPv6 Fast Handover (FMIPv6) that requires time-consuming IEEE 802.1x-based Extensible Authentication Protocol (EAP) authentication on each L3 handover, the newly proposed key management and security scheme requires only one 802.1x-EAP regardless of how many L3 handovers occur. Therefore, the proposed scheme reduces the handover latency that results from a lengthy 802.1x-based EAP. The proposed key management and security scheme is extensively analyzed in terms of security and performance, and the proposed security scheme is shown to be more secure than those that were previously proposed.


2014 ◽  
Vol 721 ◽  
pp. 728-731
Author(s):  
Da Wei Dong ◽  
Xiao Guo Liu ◽  
Tian Jing

To reduce the number of inter-disturb access points and the interference among access points in same channel, with research on interference issus and channel assignment algorithms of wireless local area network, a scheme suitable for centralized wireless local area network was proposed aiming to minimize the total interference among access points, which comprehensively considerate the number of neighbor and the received power. And then the algorithm with cases was simulated and analyzed, the result of NS2 simulation indicated that the algorithm was simple, effective and feasible, which could realize dynamic adjustment to the wireless LAN RF channel and had a better load balance effect among non-overlapping channels.


2012 ◽  
Vol 16 (6) ◽  
pp. 39-45
Author(s):  
A.V. Lazebnyi ◽  
Volodymyr Semenovych Lazebnyi

The concept of a virtual contention window for assessment of temporal and probabilistic characteristics of the processes occurring in the wireless LAN 802.11 is considered. The relations for determining the transmission time delay of the data package, the uneven of transmission time, throughput of wireless channel, the probability of packet loss for networks with saturated load are proposed in this paper.


T-Comm ◽  
2021 ◽  
Vol 15 (7) ◽  
pp. 28-33
Author(s):  
Albina Y. Sharifullina ◽  
◽  
Roman R. Galyamov ◽  
Rimma S. Zaripova ◽  
◽  
...  

This article discusses the stages of development, characteristics of a wireless local area network Wi-Fi, options for its topology and equipment used. Currently, there are such different types of wireless networks as Wireless Wide Area Network, Wireless Metropolitan Area Networks (Wireless Neighborhood Area Network), Wireless Local Area Network, Wireless Personal Area Network. Each of the listed wireless networks has its own specific range and application. Wireless LAN Wi-Fi refers to the Wireless Local Area Network. The first wireless LAN standard, Wi-Fi, was approved in 1997. From the moment of their appearance to the present day, the following standards of this network have appeared: 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac, 802.11ad, 802.11ax. For each standard, the speeds and frequency ranges at which the data transmission was carried out are indicated, and the technologies on which they are built are described. Wireless LAN Wi-Fi has three topologies: 1) Ad-Hoc (point-to-point) or Independent Basic Service Set; 2) Basic Service Set (“client / server”) and 3) Extended Service Set (“extended service areas”). To build a Wi-Fi network, network adapters, access points, routers, ADSL modems, Wi-Fi phones, Wi-Fi antennas, Wi-Fi repeaters are used. Wi-Fi adapters are used by devices that do not have a built-in Wi-Fi module. Wi-Fi access points are designed for organizing wireless access within a local network. Wi-Fi routers are designed to route traffic on a computer network. ADSL modems are used to access the Internet over a telephone line. Wi-Fi repeaters are used to expand the coverage of a wireless network using already installed equipment. Wi-Fi phones are wireless IP phones. Wi-Fi antennas are used to extend the range of a wireless network.


2021 ◽  
Vol 17 (3) ◽  
Author(s):  
I Putu Sudharma Yoga ◽  
Gede Sukadarmika ◽  
Linawati .

Rapid technological development, triggering various applications development that are increasingly innovative. One of them is the Internet of Things (IoT) system that makes human works easier and more effective. Along with sensor technology development in monitoring and controlling through IoT systems, a mechanism is needed to manage bandwidth so that IoT system can function optimally, especially in buildings designated as public areas. Smart building supported by various integrated sensors to maintain safety and comfort in the area. This study proposes the application of Elastic WLAN as a model for dynamic bandwidth management in IoT systems. In this model, IoT bandwidth changes automatically according to the number of traffic measurements for each IoT connected to the network As an effort to determine the performance of the elastic WLAN mechanism, this study succeeded in developing a prototype IoT device that implements Elastic WLAN on an Access-Point Raspberry Pi by using two temperature sensors placed in separate locations. The system successfully allocates bandwidth to each IoT according to the amount of data input from each temperature sensor installed. The higher the amount of data captured by the sensor, the system will automatically allocate the higher bandwidth to the sensor system, and vice versa.


2019 ◽  
Vol 1 (1) ◽  
pp. 103-113
Author(s):  
Janero Kennedy ◽  
Soleh Nur Rohman

The background is a problem that occurs in al-Ittihad elementary school which causes the author to take the title of this thesis. . Around the Al-Ittihad Elementary School, the network signal from ISP providers, both GSM and CDMA, is not very good so that the data access received is not optimal. This is based on the author's own experience using GSM modems, surveys and interviews with teachers and school staff at Al-Ittihad Elementary School. Also faced with the fact that the high tariff for unlimited data access from the service provider PT. Telkom (speedy) made the author look for a solution, is there another way that is cheaper and simpler to be able to use the internet easily in the scope of this al-Ittihad elementary school comfortably, safely without having to worry about banned sites. The purpose and objective of the research is to first recognize and understand further computer network technology, especially wireless/wireless (wireless) networks. Both members make it easy for users to access the internet. Third, knowing the technique of making / building an infrastructure and implementation. Fourth, get to know information technology in the al-Ittihad elementary school environment. The research method is the method used by the author in the preparation of this thesis. The author uses methods and techniques to compile and present appropriate and accurate information. Therefore, appropriate methods and techniques are needed to obtain valid and accountable data. The method used by the author is as follows, the first research location. Second Collecting data and third Designing. Implementation is discussing how to install and configure the devices used in designing the WLAN network at the Al-Ittihad elementary school in Cilacap with Mikrotik. The output or results achieved in the design of this WLAN (Wireless Local Area Network) is to provide convenience for teachers, students and school visitors in accessing the internet, accessing the internet is not only in the school room but can also be accessed around the school environment via a wireless network. and does not require a data cable so that it is more efficient and effective.


Sign in / Sign up

Export Citation Format

Share Document