1,238 research outputs found

    Case Study - IPv6 based building automation solution integration into an IPv4 Network Service Provider infrastructure

    Get PDF
    The case study presents a case study describing an Internet Protocol (IP) version 6 (v6) introduction to an IPv4 Internet Service Provider (ISP) network infrastructure. The case study driver is an ISP willing to introduce a new “killer” service related to Internet of Things (IoT) style building automation. The provider and cooperation of third party companies specialized in building automation will provide the service. The ISP has to deliver the network access layer and to accommodate the building automation solution traffic throughout its network infrastructure. The third party companies are system integrators and building automation solution vendors. IPv6 is suitable for such solutions due to the following reasons. The operator can’t accommodate large number of IPv4 embedded devices in its current network due to the lack of address space and the fact that many of those will need clear 2 way IP communication channel. The Authors propose a strategy for IPv6 introduction into operator infrastructure based on the current network architecture present service portfolio and several transition mechanisms. The strategy has been applied in laboratory with setup close enough to the current operator’s network. The criterion for a successful experiment is full two-way IPv6 application layer connectivity between the IPv6 server and the IPv6 Internet of Things (IoT) cloud

    Ethernet - a survey on its fields of application

    Get PDF
    During the last decades, Ethernet progressively became the most widely used local area networking (LAN) technology. Apart from LAN installations, Ethernet became also attractive for many other fields of application, ranging from industry to avionics, telecommunication, and multimedia. The expanded application of this technology is mainly due to its significant assets like reduced cost, backward-compatibility, flexibility, and expandability. However, this new trend raises some problems concerning the services of the protocol and the requirements for each application. Therefore, specific adaptations prove essential to integrate this communication technology in each field of application. Our primary objective is to show how Ethernet has been enhanced to comply with the specific requirements of several application fields, particularly in transport, embedded and multimedia contexts. The paper first describes the common Ethernet LAN technology and highlights its main features. It reviews the most important specific Ethernet versions with respect to each application field’s requirements. Finally, we compare these different fields of application and we particularly focus on the fundamental concepts and the quality of service capabilities of each proposal

    ANVIA ENTERPRISE WIRELESS LOCAL AREA NETWORK MARKET ANALYZES AND BUSINESS MODEL ENHANCEMENTS.

    Get PDF
    For almost 15 years, since it has been released, Wi-Fi has been one of the dominant technologies in telecommunication world. However, because of its weaknesses related to security, interference and weak quality of service it has not been accepted as a viable business. Furthermore, it also operates in unlicensed spectrum bands which magnify these issues. On the other hand, technological innovations through new improvements in the world of Wi-Fi have made it one of the most popular indoor communication solutions for enterprises as well as in outdoor common meeting points. Therefore, it has become imperative to study this subject due to its popularity and several issues associated with this technology to create a viable business model for Anvia Oyj. In an attempt to contribute towards this field, present thesis provides a comprehensive theoretical framework that addresses WLAN technology from different aspects including Wi-Fi roaming as well as the description of business model segments. In order to strengthen enterprise WLAN business models, a comprehensive data was collected through different resources. First, an internal interview in Anvia Oyj based on its current enterprise WLAN business model was conducted. Secondly, two surveys were conducted in different enterprise WLAN customer segments; 32 interviews with small office home office (SOHO) enterprises and 10 interviews with SMEs/LEs and municipalities. Thirdly, a global enterprise WLAN market analysis was conducted through Internet resources. Based on these, analyzes, recommendations and business model enhancements are suggested in this thesis. The findings of this research will help Anvia Oyj to achieve better performance in enterprise WLAN business segment.fi=OpinnÀytetyö kokotekstinÀ PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=LÀrdomsprov tillgÀngligt som fulltext i PDF-format

    Asymmetric digital subscriber line technology and the future of remote access networking

    Get PDF
    Not provided

    Firmware enhancements for BYOD-aware network security

    Get PDF
    In today’s connected world, users migrate within a complex set of networks, including, but not limited to, 3G and 4G (LTE) services provided by mobile operators, Wi-Fi hotspots in private and public places, as well as wireless and/or wired LAN access in business and home environments. Following the widely expanding Bring Your Own Device (BYOD) approach, many public and educational institutions have begun to encourage customers and students to use their own devices at all times. While this may be cost-effective in terms of decreased investments in hardware and consequently lower maintenance fees on a long-term basis, it may also involve some security risks. In particular, many users are often connected to more than one network and/or communication service provider at the same time, for example to a 3G/4G mobile network and to a Wi-Fi. In a BYOD setting, an infected device or a rogue one can turn into an unwanted gateway, causing a security breach by leaking information across networks. Aiming at investigating in greater detail the implications of BYOD on network security in private and business settings we are building a framework for experiments with mobile routers both in home and business networks. This is a continuation of our earlier work on communications and services with enhanced security for network appliances

    Evaluating a Unified Intellectual Property System of Internet Service Providers in the Electronic Commerce Law -- A Comparative Research Between China and the U.S.

    Get PDF
    As the Electronic Commerce Law went into effective in Jan. 1st, 2019, not only did China establish a unified IP protection system of ISPs, but also set up a blueprint for a comprehensive mechanism of ISPs for the future improvement. The question is whether this new law can effectively prevent the serious IP infringement issues of ISPs and therefore successfully improve the IP protection in China. To answerer this question, the dissertation analyzes the development of the mechanism of ISPs in copyright and trademark regimes before the Electronic Commerce Law, and seeks to demonstrate the impact of the Electronic Commerce Law for ISPs in China through a comparatively research. Before the Electronic Commerce Law, China followed a passive-reactive approach of ISPs from the U.S. However, as the online piracy and counterfeit issues continued to grow in the last decade, Chinese legislation decided to shift to an active-preventive approach of ISPs in the Electronic Commerce Law. By comparatively examining the copyright and trademark infringement issues of ISPs between China and the U.S., this dissertation analyzes the benefits and drawbacks of these two approaches, and seeks to demonstrate how an active-preventive approach may prevent infringements more effectively than a passive-reactive approach in China. To conclude a solution for Chinese legislation to improve the unified IP protection system of ISPs, this dissertation examines several active-preventive approaches in different jurisdictions through different cases of ISPs. As a suggestion for the future legal reform, this dissertation explores the possibility of whether Chinese legislation can legally transplant the Blocking Injunction into the unified IP protection system of ISPs, which may improve the mechanism of ISPs and provide a better IP protection in China

    Film in the city: a report on the film & video sub-Sector in London

    Full text link
    The movie business, and the distribution of films through the associated cinema and home video sectors is a truly global phenomenon. In terms of both production and distribution, Hollywood has traditionally dominated international markets, however, with radical innovations in information and digital technologies and the spread of the Internet, it has become increasingly easier to make and distribute films around the world . Coupled with this is the ‘runaway production’ concept, whereby Hollywood productions are no longer tied to site-specific studios and can choose to shoot and edit their (usually high-budget) movies in locations around the globe. This has created an international market where cities, such as Vancouver, Sydney, Brisbane, Prague, Cape Town, London and many more, compete for big movie business. London has a thriving film and video sub-sector and a highly competitive infrastructure, nurtured by a host of supporting institutions, which together create a powerful creative network of players capable of competing at a global scale. The physical geography of the city also matters to the film industry, not only in terms of shooting locations, but also in determining where to locate, pitch or exhibit the final creative product. Consequently, the location and interconnected value chain of producers, post-production, financiers, sales agents and distributors, cinemas and theatres, as well as the myriad of specialised and highly skilled workforce is key to the industry’s success. The co-location and clustering tendencies of individuals and institutions located at close proximity in London and highlighted in this report are evidence of the intense social networking that characterises the industry

    Business development trends and analysis for the data networking market

    Get PDF
    Thesis (S.M. in Engineering and Management)--Massachusetts Institute of Technology, Engineering Systems Division, System Design and Management Program, 2011.Cataloged from PDF version of thesis.Includes bibliographical references (p. 89-96).The Internet has come a long way after the widely reported invention by Sandra Lerner and Leonard Bosack of the router, a device that can transmit data from one network to another based on certain protocols and principles. Despite a slow start in the mid 1980s, the Internet has emerged as one of the primary means of communication for people of all walks of life. Sophisticated, network-aware applications that integrate data, voice and video have helped fuel this growth. This thesis examines the latest technology trends and historical developments in various market segments of the Internet. Using technology trends as a backdrop, it analyzes business development at Cisco Systems, Inc., a major player in all Internet market segments. Well-known tools and concepts such as the Familiarity Matrix and Technology S-curve are used for case studies of business development at Cisco. Business Development is almost always a high-stakes endeavor requiring keen insight on both financial and strategy fronts. What are good strategies for corporate entrepreneurship? What are the challenges in business development by way of acquisitions? Will cyber anonymity continue to make us lonely and distanced, or will there be a new breed of Internet applications that will genuinely bring people closer? These are some of the questions this thesis explores, drawing on the wisdom and experience of industry experts.by Devadas V. Patil.S.M.in Engineering and Managemen

    A Disaggregated MEC Architecture Enabling Open Services and Novel Business Models

    Get PDF
    Network and Service Providers are exploring different exploitation strategies for the Multi-access Edge Computing (MEC), mainly motivated by the opportunities for saving costs and generating new revenues (e.g., through new business models). On the other hand, the overall standardization picture is still very fragmented, delaying or even jeopardizing the real exploitation of MEC; furthermore, current standardization efforts are mainly envisioning a traditional monolithic architecture, with many technological partners but a single administrative domain. This paper argues that a clear separation of IaaS, PaaS and SaaS levels for MEC, together with standardized interfaces, will help accelerating the development of new business roles (e.g., IaaS, PaaS and SaaS providers) and models, possibly replacing the current competition-oriented practices in the telco domain with new forms of cooperation, which are already starting to appear in the IT sector. In this direction, this paper proposes a disaggregated MEC architecture and presents two use cases that show how different categories of resources and services could be provided by infrastructure, platform and software providers in an evolutionary scenario towards 5G
    • 

    corecore