A FLEXIBLE ROUTER WITH TANGIBLE NETWORK INTERFACES
FOR SHARING A LAST MILE AND ITS PERFORMANCE
Keywords:
Wi-Fi hotspot, disaster mitigation, last mile, Tangible User Interface, flexible routerAbstract
After the big earthquake in 2011 in Japan, the disaster survivors lost the means to acquire and convey information in the stricken area. In this paper, we propose a means to share seamless access to the Internet immediately among survivors using surviving access lines including ground infrastructures and satellite communications even if disaster exceeds assumption. We introduce the notion of TNI (Tangible Network Interface) that can easily configure small handy router named Flexible Router on site without configuring the settings of router from external console device. We also introduce Integrated Wireless Authentication System to share Internet access line among disaster survivors. We implemented Flexible Router and its TNIs and demonstrate its performance as well as the solution to improve its poor performance of Wi-Fi device and the intercontinental throughput measurement over VPN (Virtual Private Network).
Downloads
References
Mori, N., Takahashi, T., and the 2011 Tohoku earthquake tsunami joint survey group 2012.
“Nationwide post event survey and analysis of the 2011 Tohoku earthquake tsunami,” Coastal
Engineering Journal, 54, 1-27.
Marco, C. 2007. “Multihop Ad Hoc Networking: The Theory,” IEEE Communications
Magazine, 45 (4), 78-86. DOI= http://dx.doi.org/10.1109/MCOM.2007.343616.
McMahon, A. and Farrell, S. 2009. “Delay- and Disruption-Tolerant Networking", IEEE
Internet Computing, 13 (6), 82-87. DOI= http://dx.doi.org/10.1109/MIC.2009.127.
Ishii, H. and Ullmer, B. 1997. “Tangible bits: towards seamless interfaces between people,
bits and atoms,” In Proc. of the ACM SIGCHI Conference on Human factors in computing
systems CHI ‘97. ACM, New York, NY, 234-241. DOI=
http://dx.doi.org/10.1145/258549.258715.
Srisuresh, P. and Egevang, K. 2001. “Traditional IP Network Address Translator (Traditional
NAT),” RFC (Request for Comments) 3022, IETF (Internet Engineering Task Force).
Droms, R. 1997. “Dynamic Host Configuration Protocol,” RFC 2131, IETF.
Cohen, R. and Kaempfer, G. 2000. “On the cost of virtual private networks,” IEEE/ACM
Trans. on Networking, 8 (6), IEEE Press Piscataway, NJ, 775-784.
DOI=http://dx.doi.org/10.1109/90.893873.
Knight, P. and Lewis, C. 2004. “Layer 2 and 3 virtual private networks: taxonomy,
technology, and standardization efforts,” IEEE Communications Magazine, 42 (6), IEEE, 124-
DOI=http://dx.doi.org/10.1109/MCOM.2004.1304248.
Jamaluddin, J., Doherty, M., Edwards, R., and Coulton, P. 2004. “A hybrid operating model
for wireless hotspot businesses,” In Proc. of First IEEE Consumer Communications and
Networking Conference (Las Vegas, NV, Jan. 05-08, 2004). CCNC 2004. IEEE, 611-615.
DOI=http://dx.doi.org/10.1109/CCNC.2004.1286931.
SoftBank Mobile Corp. 2011. “SoftBank Wi-Fi Spots Available Free of Charge,”
http://mb.softbank.jp/en/news_information/20110312_02.html (accessible on 11th, Mar.
.
Ogawa, H., Nishimura, T., and Maeda, T. 2003. “Integrated Wireless Authentication System,”
Japanese Patent 4332000.
Nishimura, T. 2010. “A Distributed Authentication Mechanism for Sharing an Overlay
Network among Multiple Organizations,” In Proc. of the 12th International Conference on
Information Integration and Web-based Applications & Services (Paris, France, Nov. 08-10,
. iiWAS ’10. ACM, New York, NY, 811-815.
DOI=http://dx.doi.org/10.1145/1967486.1967622.
Nishimura, T. 2011. “Distributed Authentication for Sharing an Overlay Network Among
Multiple Organization,” In Proc. of Innovations in Information and Communication Science
and Technology (Tomsk, Russia, Oct. 03-07, 2011). IICST2011. Publishing Office of Tomsk
University of Control Systems and Radio Electronics, Tomsk, Russia, 69-78.
Mamakos, L., Lidl, K., Evarts, J., Carrel, D., Simone, D., and Wheeler, R. 1999. “A Method
for Transmitting PPP Over Ethernet (PPPoE),” RFC 2516, IETF.
Hamzeh, K., Pall, G., Verthein, W., Taarud, J., Little, W., and Zorn, G. 1999. “Point-to-Point
Tunneling Protocol (PPTP),” RFC 2637, IETF.
Simpson, W. 1994. “The Point-to-Point Protocol (PPP),” RFC 1661, IETF.
Ookla 2012. “How does the test itself work? How is the result calculated? ,”
https://support.speedtest.net/hc/en-us/articles/203845400-How-does-the-test-itself-work-Howis-
the-result-calculated- (accessible on 11th, Mar. 2016).
Nishimura, T. and Ogawa, H. 2013. “Integrated Wireless Authentication System: Sharing
Satellite Communication among Multiple Organizations after Natural Disasters,” In Proc. of
the 11th International Conference on Advances in Mobile Computing & Multimedia (Vienna,
Austria Dec. 02-04, 2013). MoMM2013. ACM, New York, NY, 270-277.
DOI=http://dx.doi.org/10.1145/2536853.2536884.
Townsley, W., Valencia, A., Rubens, A., Pall, G., Zorn, G., and Palter, B. 1999. “Layer Two
Tunneling Protocol "L2TP",” RFC 2661, IETF.
Kotuliak, I., Rybár, P., and Trúchly, P. 2011. “Performance comparison of IPsec and TLS
based VPN technologies,” In Proc. 9th International Conference on Emerging eLearning
Technologies and Applications (Stara Lesna, Slovakia Oct. 27-28, 2011). ICETA 2011. IEEE,
-221. DOI=http://dx.doi.org/10.1109/ICETA.2011.6112567.
Kim, M. J. and Maher, M. L. 2008. “The impact of tangible user interfaces on spatial
cognition during collaborative design,’’ Design Studies, 29, 3, 222-253.
DOI=http://dx.doi.org/10.1016/j.destud.2007.12.006.
Kobayashi, K., Hirano, M., Narita, A., and Ishii, H. 2003. “A Tangible Interface for IP
Network Simulation,’’ In Proc. of CHI ‘03 Extended Abstracts on Human Factors in
Computing Systems, ACM, New York, NY, 800-801.
DOI=http://dx.doi.org/10.1145/765891.766000.
Asokan, N., Dmitrienko, A., Nagy, M., Reshetova, E., Sadeghi, A. R., Schneider, T., and
Stelle, S. 2013. “CrowdShare: Secure Mobile Resource Sharing, ’’ Applied Cryptography and
Network Security, Lecture Notes in Computer Science 7954, Springer-Verlag, Berlin /
Heidelberg, Germany, 432-440. DOI=http://dx.doi.org/10.1007/978-3-642-38980-1_27.
Google Inc. 2013. “Loon for All – Project Loon – Google,” https://www.google.com/loon/
(accessible on 11th, Mar. 2016).