3,159 research outputs found

    Network Awareness for Wireless Peer-to-Peer Collaborative Environments

    Get PDF
    Presentation to the 37th Hawaii International Conference on System Science. Hilton Waikoloa Village, Island of Hawaii, 5-8 January 2004.The implications of using mobile wireless communications are significant for emerging peer-to-peer (P2P) collaborative environments. From a networking perspective, the use of wireless technologies to support collaboration may impact bandwidth and spectrum utilization. This paper explores the effects of providing feedback to system users regarding wireless P2P network behavior on the performance of collaboration support applications. We refer to this operational feedback as "network awareness." The underlying premise is that providing feedback on the status of the network will enable users to self-organize their behavior to maintain quality of data sharing. Results achieved during an experiment conducted at the Naval Postgraduate School demonstrate significant effects of roaming on application sharing performance and integration with client-server applications. A solution for improving network aware P2P collaboration, identified in the experiment, is discussed

    Students and mobile devices: choosing which dream

    Get PDF
    There is a crisis looming and a paradox emerging. Many educators advocate, promote and encourage the dreams of agency, control, ownership and choice amongst students whilst educational institutions take the responsibility for provision, equity, access, participation and standards. The institutions traditionally procure, provide and control the technology for learning but now students are acquiring their own personal technologies for learning and institutions are challenged to keep pace. These allow students to produce, store, transmit and consume information, images and ideas; this potentially realises the educators’ dream but is for institutions potentially a nightmare, one of loss of control and loss of the quality, consistency, uniformity and stability that delivered the dreams of equity, access and participation. This paper traces the conflicting dreams and responsibilities

    Vertical Merger Enforcement Actions: 1994–April 2020

    Get PDF
    We have revised our earlier listing of vertical merger enforcement actions by the Department of Justice and Federal Trade Commission since 1994. This revised listing includes 66 vertical matters beginning in 1994 through April 2020. It includes challenges and certain proposed transactions that were abandoned in the face of Agency concerns. This listing can be treated as an Appendix to Steven C. Salop and Daniel P. Culley, Revising the Vertical Merger Guidelines: Policy Issues and an Interim Guide for Practitioners, 4 JOURNAL OF ANTITRUST ENFORCEMENT 1 (2016)

    IMPLEMENTATION OF TACTICAL OPEN SOURCE 5G MOBILE NETWORKS

    Get PDF
    The implementation of fifth-generation (5G) communications technology is a global effort, with China leading the way. The Department of Defense has initiated efforts on 5G implementation from smart warehouses to virtual combat training; however, focus on the tactical communications level remains minimal. This thesis examines the feasibility of using OpenAirInterface Software Alliance (OSA) software to build a private mobile ad hoc 5G network for various military applications. First, we created a Fourth Generation/Long Term Evolution network utilizing commercial off-the-shelf equipment and software to operate the radio access network (RAN), software-defined radio, and an evolved packet core (EPC). Then we connected the EPC to an 802.11 network for internet access. We successfully configured a subscriber identification module and smartphone and attached it to the network for data services. Although the OSA software is robust and customizable, it is difficult to make changes, is restrictive in which user equipment (UE) can connect to the network, and does not reliably allow the UE to connect. The potential of OSA software for military applications is apparent but does not appear ready for field implementation. Going forward, we recommend researchers use this work to implement new software versions and test scalability to reassess the feasibility of OSA software.NCWDGLieutenant Commander, United States NavyApproved for public release. Distribution is unlimited

    An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applications

    Full text link
    Mobile Ad Hoc Network (MANET) is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized administrator also the wireless nodes that can dynamically form a network to exchange information without using any existing fixed network infrastructure. And it's an autonomous system in which mobile hosts connected by wireless links are free to be dynamically and some time act as routers at the same time, and we discuss in this paper the distinct characteristics of traditional wired networks, including network configuration may change at any time, there is no direction or limit the movement and so on, and thus needed a new optional path Agreement (Routing Protocol) to identify nodes for these actions communicate with each other path, An ideal choice way the agreement should not only be able to find the right path, and the Ad Hoc Network must be able to adapt to changing network of this type at any time. and we talk in details in this paper all the information of Mobile Ad Hoc Network which include the History of ad hoc, wireless ad hoc, wireless mobile approaches and types of mobile ad Hoc networks, and then we present more than 13 types of the routing Ad Hoc Networks protocols have been proposed. In this paper, the more representative of routing protocols, analysis of individual characteristics and advantages and disadvantages to collate and compare, and present the all applications or the Possible Service of Ad Hoc Networks.Comment: 24 Pages, JGraph-Hoc Journa

    21st Century Simulation: Exploiting High Performance Computing and Data Analysis

    Get PDF
    This paper identifies, defines, and analyzes the limitations imposed on Modeling and Simulation by outmoded paradigms in computer utilization and data analysis. The authors then discuss two emerging capabilities to overcome these limitations: High Performance Parallel Computing and Advanced Data Analysis. First, parallel computing, in supercomputers and Linux clusters, has proven effective by providing users an advantage in computing power. This has been characterized as a ten-year lead over the use of single-processor computers. Second, advanced data analysis techniques are both necessitated and enabled by this leap in computing power. JFCOM's JESPP project is one of the few simulation initiatives to effectively embrace these concepts. The challenges facing the defense analyst today have grown to include the need to consider operations among non-combatant populations, to focus on impacts to civilian infrastructure, to differentiate combatants from non-combatants, and to understand non-linear, asymmetric warfare. These requirements stretch both current computational techniques and data analysis methodologies. In this paper, documented examples and potential solutions will be advanced. The authors discuss the paths to successful implementation based on their experience. Reviewed technologies include parallel computing, cluster computing, grid computing, data logging, OpsResearch, database advances, data mining, evolutionary computing, genetic algorithms, and Monte Carlo sensitivity analyses. The modeling and simulation community has significant potential to provide more opportunities for training and analysis. Simulations must include increasingly sophisticated environments, better emulations of foes, and more realistic civilian populations. Overcoming the implementation challenges will produce dramatically better insights, for trainees and analysts. High Performance Parallel Computing and Advanced Data Analysis promise increased understanding of future vulnerabilities to help avoid unneeded mission failures and unacceptable personnel losses. The authors set forth road maps for rapid prototyping and adoption of advanced capabilities. They discuss the beneficial impact of embracing these technologies, as well as risk mitigation required to ensure success

    ATM-based TH-SSMA network for multimedia PCS

    Get PDF
    Personal communications services (PCS) promise to provide a variety of information exchanges among users with any type of mobility, at any time, in any place, through any available device. To achieve this ambitious goal, two of the major challenges in the system design are: i) to provide a high-speed wireless subsystem with large capacity and acceptable quality-of-service (QoS) and ii) to design a network architecture capable of supporting multimedia traffic and various kinds of user mobility. A time-hopping spread-spectrum wireless communication system called ultra-wide bandwidth (UWB) radio is used to provide communications that are low power, high data rate, fade resistant, and relatively shadow free in a dense multipath environment. Receiver-signal processing of UWB radio is described, and performance of such communications systems, in terms of multiple-access capability, is estimated under ideal multiple-access channel conditions. A UWB-signal propagation experiment is performed using the bandwidth in excess of 1 GHz in a typical modern office building in order to characterize the UWB-signal propagation channel. The experimental results demonstrate the feasibility of the UWB radio and its robustness in a dense multipath environment. In this paper, an ATM network is used as the backbone network due to its high bandwidth, fast switching capability, flexibility, and well-developed infrastructure. To minimize the impact caused by user mobility on the system performance, a hierarchical network-control architecture is postulated. A wireless virtual circuit (WVC) concept is proposed to improve the transmission efficiency and simplify the network control in the wireless subsystem. The key advantage of this network architecture and WVC concept is that the handoff can be done locally most of the time, due to the localized behavior of PCS users.published_or_final_versio
    corecore