1 / 51

S-IOT for Proximity Service: Mobile Group Handoff Architecture and Schemes

This paper presents a mobile group handoff architecture and schemes for proximity service in the Social Internet of Things (S-IOT) framework. It investigates a group touring scenario that integrates mobile social networks, device-to-device communication, location-based services, and 4G cellular and Wi-Fi networks. The proposed scheme utilizes conservative and aggressive policies for seamless handoff between mobile access points (m-APs) and fixed access points (f-APs) based on group members' movements. Performance analysis shows the effectiveness of the proposed architecture and schemes.

broy
Download Presentation

S-IOT for Proximity Service: Mobile Group Handoff Architecture and Schemes

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. “The Social Internet of Thing (S-IOT)-based Mobile Group Handoff Architecture and Schemes for Proximity Service“ Chung-Ming Huang, Chih-Hsiang Shao, Shou-Zhi Xu and Huang Zhou IEEE Transactions on Emerging Topics in Computing, VOL. 5, NO. 3, pp. 425-437, July 2017.

  2. Outline Introduction The Proposed Architecture for Social Internet of Things (S-IOT) The Proposed Scheme Performance Analysis Conclusion

  3. Introduction

  4. Introduction • Proximity Service (ProSe): Mobile nodes can communicate with each other directly using the Device-to-Device (D2D) communication paradigm without going through the infrastructure side. • ProSe may be one of the killer applications for the future 5G cellular network. • Mobile Social Network in Proximity (MSNP): Mobile nodes that belong to the same MSN are proximate and can communicate with each other directly using the Device-to-Device (D2D) communicationparadigm.

  5. Introduction • What killer applications and services can belong to Proximity Service (ProSe)? We cannot try to find them when 5G cellular network is ready. • A group touring service that is based on MSNP is investigated in this paper: It integrates MSN, D2D communication, LBS (Location-based services), Machine-to-Machine (M2M) communication over the 4G cellular and 802.11* Wi Fi mobile converged networks to have the pilot study.

  6. Motivation • The current tour guide system belongs to an individual touring system, i.e., each user downloads his POIs’ contents using his handheld devices’ 4G or Wi Fi network. • A group touring scenario means that a group of people have a trip or journey together, e.g., a tour guide with his members, walk through the same route and visit the same Point Of Interests (POIs).

  7. The Considered Group Touring Scenario It is assumed that every tourist in the group has one handheld device. The tour guide enables the Wi Fi hot spot service of his own handheld device, which plays the role of mobile proxy and mobile AP (m-AP), and each tourist has his handheld device to connect with the m-AP of the tour guide’s handheld device. The tour guide’s handheld device can download the corresponding POIs’ contents from the server through the 4G cellular network and then forward these contents to all members’ handheld devices using the Wi Fi D2D communication paradigm. It then can save the 4G cellular network’s expense and reduce the traffic in the 4G cellular network.

  8. The Considered Group Touring Scenario • In this paper, a group touring scenario in which a group of people have a trip or journey together is considered. It is assumed that every tourist in the group has one handheld device. • m-AP mode: • The tour guide enables the Wi Fi hot spot service of his own handheld device, which plays the role of mobile proxy and mobile AP (m-AP), and each tourist has his handheld device to connect with the m-AP of the tour guide’s handheld device. • f-AP mode: • Many POIs’ may install some Wi Fi APs, which are called fixed APs (f-APs) hereafter, to provide free Wi Fi services to users. All handheld devices connect to the f-AP using the Wi Fi interfaces.

  9. Problem Definition When should it be to have all of the handheld devices to change from the m-AP mode to f-AP mode and vice versa? How should all of the handheld devices know that it is Ok to change from the m-AP modeto f-AP mode and vice versa? Can it be predictable to have all of the handheld devices to change from the m-AP mode to f-AP mode and vice versa? How to handle the group handoff change from the m-AP mode to f-AP mode and vice versa?

  10. The Proposed Architecture for Social Internet of Things (S-IOT)

  11. Introduction • S-IOT (Social IOT) • Automatically trigger some inter-mobile-devices’ interactions when some conditions are satisfied based on human beings behaviors. • Relationship between handheld devices come from the users • LBS (Location-based services) • Using the real-time positioning technique, e.g., GPS, users’ handheld devices can download their neighboring POIs’ contents based on users’ current geo-locations.

  12. Functional Flow’s ConfigurationThe Mobile Access Point (m-AP) Mode

  13. Functional Flow’s ConfigurationFixed Access Point (f-AP) Mode

  14. System components of the proposed S-IOT architecture

  15. System Components (Control Flow) Control flow in the m-AP mode

  16. System Components (Control Flow) Control flow in the f-AP mode

  17. The Proposed Scheme

  18. Control Scheme • Conservative Policy • Handoff from m-AP to f-AP when all of the group members are inside the signal coverage of the f-AP • Aggressive Policy • Handoff from m-AP to f-AP when it is predicted that more than x% of the group members are moving into the signal coverage of the f-AP before all of the group members are inside the signal coverage of the f-AP

  19. Initialization • A tour guide (P) initiates the grouping • Enable the m-AP function • Notify the MSN and S-IOT server • Other members connect to P’s handheld device • Send context to P’s handheld device • P’s handheld device forwards contexts to the S-IOT server • Group is formed

  20. The Conservative Policy Two main issues: Which event can trigger the handoff from m-AP to f-AP and how to select a handheld device to play the role of the multicast agent? Which event can trigger the handoff from f-AP to m-AP and how to select a handheld device to play the role of the m-AP and mobile proxy to which all of the members’ handheld devices can connect?

  21. The Conservative Policy Criteria of handoff from m-AP to f-AP to refresh POIs • Cached POIs’ difference ratio - cache neighboring POIs’ (help reduce the response time) - neighboring POIs ((i) the nearest k POIs or (ii) the k POIs that are within the radius of x meters ) • In the signal coverage of a f-AP (except m-AP)

  22. Cached POIs’ Difference Ratio • Let CPOIc denote the set of currently cached POIs in the mobile proxy and CPOIn denote the set of POIs that need to be cached based on the current location. • CPOId stands for different POIs between CPOIc and CPOIn, which is equal to CPOIn - CPOIc, i.e., the POIs that are in the set of CPOIn but not in the set of CPOIc. • For example, CPOIn = {a, b, c, d}; CPOIc = {a, b, e}; CPOIn - CPOIc = {c, d}. Let DRCPOI denote POIs’ difference ratio between CPOIc and CPOIn, which is equal to |CPOIn - CPOIc|/|CPOIn| × 100%. • The timing of triggering the determination of handoff from m-P to f-AP depends on DRCPOI. • When the S-IOT server finds that the group’s DRCPOI is equal to or greater than 32%, the S-IOT server has the group to refresh its cached POIs.

  23. The Conservative Policy Algorithm1: Control scheme determination from m-AP to f-AP if the group’s DRCPOl calculated by the S-IOT server is equal to or greater than 32% then Let the intersection of the sensed fixed APs among all handheld devices be f-ABrIS, r = 1..kr. if kr > 1 then Calculate , r = l..kr. Let f-AP q be the one that has the highest value among r = 1..kr. Call m-to-f handoff else if kr == 1 then Let f-AP q be the one all handheld devices sensed. Call m-to-f handoff else Have the handheld device that plays the role of mo-bile proxy to download POIs’ contents that need to be downloaded and forward (1) the POIs’ multime-dia contents using the UDP multicast way and (2) the POIs’ text contents using TCP unicast wray to all members’ handheld devices through the Wi-Fi net-work interface, endif endif endif

  24. be the RSSI value that mobile node i sensed for • Arithmetic mean: • Standard deviation: • Excellent coefficient:

  25. Control scheme for m-to-f handoff processing

  26. Control scheme for m-to-f handoff processing

  27. Multicast Agent Selection (MAS) • Let BTMax/BTMin denote the highest/lowest value of the battery level of all handheld devices in the group and Bati stand for the battery level of handheld device i. • Let the normalization of battery level for handheld device i be NBTi, which is equal to (Bati – BTMin) / (BTMax – BTMin). • Let RSSIMax / RSSIMin denote the highest/lowest RSSI value among all group’s handheld devices’ sensed RSSIs for f-AP q. • Let RSSIi stand for f-AP q’s RSSI that handheld device i has sensed. Let the normalization of RSSI value for handheld device i be NRSSIi, which is equal to (RSSIi – RSSIMin) / (RSSIMax – RSSIMin). • The S-IOT server chooses handheld device w that has the highest score based on the Multicast Agent Selection (MAS) function, which can select handheld device w among all handheld devices i, i = 1..n, that has the maximum of α*NRSSIi + (1-α)*NBTi.

  28. The control scheme for the handoff from f-AP to m-AP. If the corresponding POIs’ contents are refreshed then The S-IOT server selects handheld device p that has the highest battery level as the new m-AP. The S-IOT server transmits the Handoff_Request_f-AP_to_m-AP (p) message to each handheld device. Handheld device p disconnects with f-AP q and turns on its Wi-Fi hot spot function to play the role of m-AP and mobile proxy when it receives the Handoff_Request_f-AP_to_m-AP (p) message. Each of the other handheld devices disconnects with f-AP q and connects to m-AP p when it receives the Handoff_Request_f-AP_to_m-AP (p) message. All mobile nodes except for p send their own contexts to p. Handheld device p collects these contexts and transmits them to the LBS server. endif

  29. The Aggressive Policy The main issues: How to predict a group of handheld devices are getting into the signal coverage of the f-AP?

  30. The Aggressive Policy • Main concerns for deciding whether to have group handoff to the f-AP to refresh the cached POIs’ contents or not are (1) cached POIs’ difference ratio and (2) group mobility pattern. • The timing of triggering group handoff determination from m-P to f-AP depends on DRCPOI, which is defined in the conservative policy previously. • When the S-IOT server finds that the group’s DRCPOI is equal to or greater than 25%, the S-IOT server starts to predict the mobility pattern of each handheld device. • The S-IOT server executes the mobility judgement until the group’s DRCPOI is greater than 32%.

  31. The Mobility Judgement Formula • Let R be the radius of the f-AP signal coverage, Xi(tc) denote the X-axis coordinate of handheld device i’s current context, Yi(tc) denote the Y-axis coordinate of handheld device i’s current context, Xi(tp) denote the X-axis coordinate of handheld device i’s previous context, Yi(tp) denote the Y-axis coordinate of handheld device i’s previous context, Xf-AP denote the X-axis coordinate of the f-AP, and Yf-AP denote the Y-axis coordinate of the f-AP. • The slope of handheld device i’s moving line can be calculated as Si = Yi(tc) - Yi(tp) / Xi(tc) - Xi(tp).

  32. Mobility Determination • In this work, the aggressive policy is defined as leading all group’s handheld devices to connect to the f-AP when the sum of DP and MPP is equal to or greater than 50%. • When DP is equal to or greater than the threshold, it means that half of group’s handheld devices have sensed the f-AP; • When MPP+DP is equal to or greater than the threshold, it means that half of group’s handheld devices have already sensed or will sense the f-AP.

  33. Control scheme for determination from m-AP to f-AP

  34. Performance Analysis

  35. Experiment 1 • Situations: • Multicast agent selection (Conservative and Aggressive) • Compared Methods: • Take battery level as parameter • Take sensed f-AP’s RSSI as parameter • Take both battery level and RSSI as parameters • Compared Factors: • Battery level • Service time

  36. Figure 10. (a) A box-plot; (b) distribution of the battery level in three methods (Conservative mode); (c) distribution of the service time in three methods (Conservative mode); (d) distribution of the battery level in three methods (Aggressive mode); (e) distribution of the service time in three methods (Aggressive mode).

  37. Experiment 1 • Situations: • Multicast agent selection (Conservative and Aggressive) • Compared Methods: • Take battery level as parameter • Take sensed f-AP’s RSSI as parameter • Take both battery level and RSSI as parameters • Compared Factors: • successful packet delivery ratio(AFEC) • successful packet delivery ratio(non-AFEC)

  38. Figure 11. (a) Successful packet delivery ratio with AFEC in the conservative mode; (b) successful packet delivery ratio without AFEC in the conservative mode. (c) Successful packet delivery ratio with AFEC in the aggressive mode; (d) successful packet delivery ratio without AFEC in the aggressive mode.

  39. Experiment 2 • Compared Methods (Situations): • The pure m-AP method • The conservative policy • The aggressive policy • The individual method • Compared Factors: • Volume and times of the downloaded POIs’ contents • Service time of downloading POIs’ contents

  40. Figure 12. (a) Volume of downloading in the pure m-AP method; (b) Volume of downloading in the conservative policy; (c) Volume of downloading in the aggressive policy; (d) Volume of downloading in the individual method.

  41. Experiment 2 • Compared Methods (Situations): • The pure m-AP method • The conservative policy • The aggressive policy • The individual method • Compared Factors: • Battery level • Service time

  42. Figure 13. (a) Distribution of the battery level in four situations; (b) Distribution of the service time in four situations.

  43. Experiment 2 • Compared Methods (Situations): • The conservative policy • The aggressive policy • Compared Factors: • Accumulative volume of downloaded POIs’ contents through f-AP

  44. Figure 14. Accumulated volume of downloading through f-AP.

  45. Experiment 2 • Compared Methods (Situations): • The conservative policy • The aggressive policy • Compared Factors: • Accumulative download times through the f-AP

  46. Figure 15. Accumulated times of downloading through f-AP.

  47. Experiment 2 • Compared Methods (Situations): • The pure m-AP method • The conservative policy • The aggressive policy • The individual method • Compared Factors: • Proportion of the downloaded times through m-AP and f-AP

  48. Figure 16. Total times of downloading through m-AP and f-AP during service time.

  49. Conclusion

  50. Conclusion • S-IOT architecture • Enable relationships’ modeling and processing of the corresponding handheld devices • Group touring • m-AP and f-AP functional scenario • Sharing of downloading POIs’ contents among the handheld devices • Group handover processing from m-AP to f-AP and vice versa • Control scheme • Conservative policy and aggressive policy

More Related