Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Chien-Chao Tseng is active.

Publication


Featured researches published by Chien-Chao Tseng.


IEEE Communications Letters | 2005

Location-based fast handoff for 802.11 networks

Chien-Chao Tseng; Kuang-Hui Chi; Ming-Deng Hsieh; Hung-Hsing Chang

This paper presents a location-based approach that reduces handoff overhead in IEEE 802.11 networks. With this approach, a mobile station (MS) can derive the prospective access points (APs) most likely to be visited next, using the current location and the AP topology information acquired from some designated server. The server also provides parameters for AP (re)association so that the MS can re-associate with an AP directly without a probe beforehand. Further along the movement orientation, the MS can resolve a likely set of APs for preauthentication or proactive key distribution purposes. The performance evaluation indicates that our approach is promising.


IEEE Communications Letters | 2000

A direction-based location update scheme with a line-paging strategy for PCS networks

Hang-Wen Hwang; Ming-Feng Chang; Chien-Chao Tseng

On the problem of location update and terminal paging, many schemes using ring-paging strategies have been proposed. However, sequentially paging the rings surrounding the mobile users last updated location may cause large paging cost. We propose a direction-based location update (DBLU) scheme using a line-paging strategy to reduce the paging cost. A moving direction identification mechanism using only simple computations detects the change of moving direction and updates the mobiles location. The numerical results show that our DBLU scheme achieves good performance when the paging cost is high.


IEEE Communications Magazine | 2005

Topology-aided cross-layer fast handoff designs for IEEE 802.11/mobile IP environments

Chien-Chao Tseng; Li-Hsing Yen; Hung-Hsin Chang; Kai-Cheng Hsu

This study first reviews state-of-the-art fast handoff techniques for IEEE 802.11 or Mobile IP networks. Based on that review, topology-aided cross-layer fast handoff designs are proposed for Mobile IP over IEEE 802.1.1 networks. Time-sensitive applications, such as voice over IP (VoIP), cannot tolerate the long layer-2 plus layer-3 handoff delays that arise in IEEE 802.11/Mobile IP environments. Cross-layer designs are increasingly adopted to shorten the handoff latency time. Handoff-related layer-2 triggers may reduce the delay between layer-2 handoff completion and the associated layer-3 handoff activation. Cross-layer topology information, such as the association between 802.11 access points and Mobile IP mobility agents, together with layer-2 triggers, can be utilized by a mobile node to start layer-3 handoff-related activities, such as agent discovery, address configuration, and registration, in parallel with or prior to those of layer-2 handoff. Experimental results indicate that the whole handoff. delay can meet the delay requirement of VoIP applications when layer-3 handoff activities occur prior to layer-2 handoffs.


Wireless Personal Communications | 2012

Group-Based Authentication and Key Agreement

Yu-Wen Chen; Jui-Tang Wang; Kuang-Hui Chi; Chien-Chao Tseng

This paper presents an authentication and key agreement protocol to streamline communication activities for a group of mobile stations (MSs) roaming from the same home network (HN) to a serving network (SN). In such a roaming scenario, conventional schemes require the SN to interact with the HN for authenticating respective MSs, at the cost of repeated message exchanges and communication delay. Instead, in our design, when the first MS of a group visits, the SN performs full authentication with the concerned HN and thereby obtains authentication information for the MS and other members. Thus when any other MS of the same group visits, the SN can authenticate locally without subsequent involvement of the HN, so as to simplify protocol operations. We will show that our scheme does not trade performance for security and robustness to the extent that security requirements are unduly weakened. Both qualitative and quantitative discussions indicate that our proposed scheme lends itself to pragmatic settings.


Information Sciences | 2006

Stateful session handoff for mobile WWW

Ming-Deng Hsieh; Tsan-Pin Wang; Ching-Sung Tsai; Chien-Chao Tseng

This paper proposes a web session handoff system that can hand over not only stateless but also stateful sessions between homogenous and heterogeneous user devices to enable uninterrupted and seamless web access. The proposed system adopts a proxy-based approach and an optional client-assisted scheme in order to track and hand over session information. In the proposed system, a session is registered at a User Agent Proxy (UAP) and then tracked by the UAP so that the session can be handed over from one device via the UAP to another device. In addition to session information tracked by a UAP, the UAP can hand over more comprehensive session information by using the client-assisted scheme. Compared with client-based approaches, our design has several advantages, such as less modification to user devices, practicability, and fault tolerance. We have implemented a UAP on a PC and client programs for both PC and PDA. The implementation can successfully hand over between PC and PDA a stateful session for online shopping applications.


wireless communications and networking conference | 2014

OpenNet: A simulator for software-defined wireless local area network

Min-Cheng Chan; Chien Chen; Jun-Xian Huang; Ted Kuo; Li-Hsing Yen; Chien-Chao Tseng

This study is motivated by a plan to install a software-defined wireless local area network (SDWLAN) on campus, which possesses a desired property that both data flow and device behaviors can be software-definable. Because the installation involves hundreds of access points, we must conduct simulations beforehand to verify the design and scalability of the target system. However, existing SDN simulator like Mininet does not support modeling of wireless channel and mobility. On the other hand, common network simulator like ns-3 only has limited support for software-defined controllers and does not fully implement handover process. We thus develop OpenNet, which connects Mininet to ns3 to enjoy both Mininets advantage of controller compatibility and ns-3s ability in the wireless/mobility modeling. OpenNet also complements ns-3 by adding probe mechanism, which is missing in the current ns-3 implementation. Our simulation result demonstrates the effectiveness of OpenNet.


IEEE Internet Computing | 2006

Proactive DAD: A Fast Address-Acquisition Strategy for Mobile IPv6 Networks

Chien-Chao Tseng; Yung-Chang Wong; Li-Hsing Yen; Kai-Cheng Hsu

The increasing number of Wi-Fi-compatible mobile devices highlights various wireless access challenges, including the need for smooth hand offs between Internet attachment points in mobile IPv6 networks. To confirm address uniqueness in a new domain, mobile nodes must run duplicate address detection (DAD), which is a time-consuming process. The Proactive DAD approach uses topology information and layer-2 signals to predict the new network domains prior to or in parallel with layer-3 hand offs. Experimental results show that P-DAD can significantly reduce both hand-off latency and packet loss


IEEE Communications Letters | 2008

Hybrid Address Configuration for Tree-based Wireless Sensor Networks

Yung-Chang Wong; Jui-Tang Wang; Nai-Hsin Chang; Ho-Han Liu; Chien-Chao Tseng

This letter proposes a new scheme to alleviate the issue on address acquisition failure in wireless sensor networks (WSNs). The basic idea is to use a hierarchical address structure to make the proposed scheme less susceptible to physical distribution of WSN devices. Simulation results show that the new scheme significantly reduces the failure probability.


Journal of Network and Computer Applications | 2013

Can: A context-aware NAT traversal scheme

Chien-Chao Tseng; Chia-Liang Lin; Li-Hsing Yen; Jyun-Yan Liu; Cheng-Yuan Ho

Network Address Translation (NAT) is a technique commonly used to share one public IPv4 address among several hosts located behind a NAT device. NAT devices typically block session requests originating from outside, causing NAT traversal problem that prevents the establishment of peer-topeer (P2P) sessions. There have been many proposals for the NAT traversal problem. However, existing methods induce high connectivity check delay and resource demand when finding a communicating path, calling for a routine that determines the path best suited for a given pair of communicating peers. This study proposes CAN, a Context-Aware NAT traversal scheme which gathers and exchanges network-context information to find the most appropriate path for two communicating peers behind NAT devices. We have implemented CAN and conducted extensive experiments with off-the-shelf NAT devices to compare the performance of CAN with Interactivity Connectivity Establishment (ICE), the most acknowledged approach to creating a session across NATs. Experimental results show that CAN outperforms ICE in terms of direct communication ratio, connectivity check delay and message overload when checking connectivity.


wireless and optical communications networks | 2011

Experimental study of mismatching ESS-subnet handoffs on IP over IEEE 802.11 WLANs

Li-Hsing Yen; Hung-Hsin Chang; Shiao-Li Tsao; Chia-Chi Hung; Chien-Chao Tseng

To support delay-sensitive applications on IP over wireless LAN (WLAN), both layer-2 handoff (L2H) and layer-3 handoff (L3H) must be conducted efficiently. Prior studies toward a fast L2H/L3H assume simple networking environments where Extended Service Set (ESS) exactly matches subnets. This paper identifies performance issues associated with inter-ESS L2Hs and L3Hs under mismatching ESS-subnet configurations, and analyzes actual performance impact on existing systems. Experimental results show that inter-ESS L2Hs are much time expensive than intra-ESS L2Hs while mismatching ESS-subnet settings lead to either time-consuming L3H detections or redundant L3H executions. We also discuss possible remedies for this problem.

Collaboration


Dive into the Chien-Chao Tseng's collaboration.

Top Co-Authors

Avatar

Li-Hsing Yen

National University of Kaohsiung

View shared research outputs
Top Co-Authors

Avatar

Jui-Tang Wang

Industrial Technology Research Institute

View shared research outputs
Top Co-Authors

Avatar

Cheng-Yuan Ho

National Chiao Tung University

View shared research outputs
Top Co-Authors

Avatar

Kuei-Li Huang

National Chiao Tung University

View shared research outputs
Top Co-Authors

Avatar

Chia-Liang Lin

National Chiao Tung University

View shared research outputs
Top Co-Authors

Avatar

Min-Cheng Chan

National Chiao Tung University

View shared research outputs
Top Co-Authors

Avatar

Chao-Nan Wu

National Chiao Tung University

View shared research outputs
Top Co-Authors

Avatar

Cheng-Yun Ho

National Chiao Tung University

View shared research outputs
Top Co-Authors

Avatar

Hang-Wen Hwang

National Chiao Tung University

View shared research outputs
Top Co-Authors

Avatar

Kai-Cheng Hsu

National Chiao Tung University

View shared research outputs
Researchain Logo
Decentralizing Knowledge