A FLEXIBLE ROUTER WITH TANGIBLE NETWORK INTERFACES

FOR SHARING A LAST MILE AND ITS PERFORMANCE

Authors

  • Toshikazu NISHIMURA College of Information Science and Engineering, Ritsumeikan University, Japan

Keywords:

Wi-Fi hotspot, disaster mitigation, last mile, Tangible User Interface, flexible router

Abstract

After the big earthquake in 2011 in Japan, the disaster survivors lost the means to acquire and convey information in the stricken area. In this paper, we propose a means to share seamless access to the Internet immediately among survivors using surviving access lines including ground infrastructures and satellite communications even if disaster exceeds assumption. We introduce the notion of TNI (Tangible Network Interface) that can easily configure small handy router named Flexible Router on site without configuring the settings of router from external console device. We also introduce Integrated Wireless Authentication System to share Internet access line among disaster survivors. We implemented Flexible Router and its TNIs and demonstrate its performance as well as the solution to improve its poor performance of Wi-Fi device and the intercontinental throughput measurement over VPN (Virtual Private Network).

 

Downloads

Download data is not yet available.

References

Mori, N., Takahashi, T., and the 2011 Tohoku earthquake tsunami joint survey group 2012.

“Nationwide post event survey and analysis of the 2011 Tohoku earthquake tsunami,” Coastal

Engineering Journal, 54, 1-27.

Marco, C. 2007. “Multihop Ad Hoc Networking: The Theory,” IEEE Communications

Magazine, 45 (4), 78-86. DOI= http://dx.doi.org/10.1109/MCOM.2007.343616.

McMahon, A. and Farrell, S. 2009. “Delay- and Disruption-Tolerant Networking", IEEE

Internet Computing, 13 (6), 82-87. DOI= http://dx.doi.org/10.1109/MIC.2009.127.

Ishii, H. and Ullmer, B. 1997. “Tangible bits: towards seamless interfaces between people,

bits and atoms,” In Proc. of the ACM SIGCHI Conference on Human factors in computing

systems CHI ‘97. ACM, New York, NY, 234-241. DOI=

http://dx.doi.org/10.1145/258549.258715.

Srisuresh, P. and Egevang, K. 2001. “Traditional IP Network Address Translator (Traditional

NAT),” RFC (Request for Comments) 3022, IETF (Internet Engineering Task Force).

Droms, R. 1997. “Dynamic Host Configuration Protocol,” RFC 2131, IETF.

Cohen, R. and Kaempfer, G. 2000. “On the cost of virtual private networks,” IEEE/ACM

Trans. on Networking, 8 (6), IEEE Press Piscataway, NJ, 775-784.

DOI=http://dx.doi.org/10.1109/90.893873.

Knight, P. and Lewis, C. 2004. “Layer 2 and 3 virtual private networks: taxonomy,

technology, and standardization efforts,” IEEE Communications Magazine, 42 (6), IEEE, 124-

DOI=http://dx.doi.org/10.1109/MCOM.2004.1304248.

Jamaluddin, J., Doherty, M., Edwards, R., and Coulton, P. 2004. “A hybrid operating model

for wireless hotspot businesses,” In Proc. of First IEEE Consumer Communications and

Networking Conference (Las Vegas, NV, Jan. 05-08, 2004). CCNC 2004. IEEE, 611-615.

DOI=http://dx.doi.org/10.1109/CCNC.2004.1286931.

SoftBank Mobile Corp. 2011. “SoftBank Wi-Fi Spots Available Free of Charge,”

http://mb.softbank.jp/en/news_information/20110312_02.html (accessible on 11th, Mar.

.

Ogawa, H., Nishimura, T., and Maeda, T. 2003. “Integrated Wireless Authentication System,”

Japanese Patent 4332000.

Nishimura, T. 2010. “A Distributed Authentication Mechanism for Sharing an Overlay

Network among Multiple Organizations,” In Proc. of the 12th International Conference on

Information Integration and Web-based Applications & Services (Paris, France, Nov. 08-10,

. iiWAS ’10. ACM, New York, NY, 811-815.

DOI=http://dx.doi.org/10.1145/1967486.1967622.

Nishimura, T. 2011. “Distributed Authentication for Sharing an Overlay Network Among

Multiple Organization,” In Proc. of Innovations in Information and Communication Science

and Technology (Tomsk, Russia, Oct. 03-07, 2011). IICST2011. Publishing Office of Tomsk

University of Control Systems and Radio Electronics, Tomsk, Russia, 69-78.

Mamakos, L., Lidl, K., Evarts, J., Carrel, D., Simone, D., and Wheeler, R. 1999. “A Method

for Transmitting PPP Over Ethernet (PPPoE),” RFC 2516, IETF.

Hamzeh, K., Pall, G., Verthein, W., Taarud, J., Little, W., and Zorn, G. 1999. “Point-to-Point

Tunneling Protocol (PPTP),” RFC 2637, IETF.

Simpson, W. 1994. “The Point-to-Point Protocol (PPP),” RFC 1661, IETF.

Ookla 2012. “How does the test itself work? How is the result calculated? ,”

https://support.speedtest.net/hc/en-us/articles/203845400-How-does-the-test-itself-work-Howis-

the-result-calculated- (accessible on 11th, Mar. 2016).

Nishimura, T. and Ogawa, H. 2013. “Integrated Wireless Authentication System: Sharing

Satellite Communication among Multiple Organizations after Natural Disasters,” In Proc. of

the 11th International Conference on Advances in Mobile Computing & Multimedia (Vienna,

Austria Dec. 02-04, 2013). MoMM2013. ACM, New York, NY, 270-277.

DOI=http://dx.doi.org/10.1145/2536853.2536884.

Townsley, W., Valencia, A., Rubens, A., Pall, G., Zorn, G., and Palter, B. 1999. “Layer Two

Tunneling Protocol "L2TP",” RFC 2661, IETF.

Kotuliak, I., Rybár, P., and Trúchly, P. 2011. “Performance comparison of IPsec and TLS

based VPN technologies,” In Proc. 9th International Conference on Emerging eLearning

Technologies and Applications (Stara Lesna, Slovakia Oct. 27-28, 2011). ICETA 2011. IEEE,

-221. DOI=http://dx.doi.org/10.1109/ICETA.2011.6112567.

Kim, M. J. and Maher, M. L. 2008. “The impact of tangible user interfaces on spatial

cognition during collaborative design,’’ Design Studies, 29, 3, 222-253.

DOI=http://dx.doi.org/10.1016/j.destud.2007.12.006.

Kobayashi, K., Hirano, M., Narita, A., and Ishii, H. 2003. “A Tangible Interface for IP

Network Simulation,’’ In Proc. of CHI ‘03 Extended Abstracts on Human Factors in

Computing Systems, ACM, New York, NY, 800-801.

DOI=http://dx.doi.org/10.1145/765891.766000.

Asokan, N., Dmitrienko, A., Nagy, M., Reshetova, E., Sadeghi, A. R., Schneider, T., and

Stelle, S. 2013. “CrowdShare: Secure Mobile Resource Sharing, ’’ Applied Cryptography and

Network Security, Lecture Notes in Computer Science 7954, Springer-Verlag, Berlin /

Heidelberg, Germany, 432-440. DOI=http://dx.doi.org/10.1007/978-3-642-38980-1_27.

Google Inc. 2013. “Loon for All – Project Loon – Google,” https://www.google.com/loon/

(accessible on 11th, Mar. 2016).

Downloads

Published

2016-02-07

How to Cite

NISHIMURA, T. . (2016). A FLEXIBLE ROUTER WITH TANGIBLE NETWORK INTERFACES: FOR SHARING A LAST MILE AND ITS PERFORMANCE. Journal of Mobile Multimedia, 12(1-2), 001–016. Retrieved from https://journals.riverpublishers.com/index.php/JMM/article/view/4475

Issue

Section

Articles