10,944 research outputs found

    From MANET to people-centric networking: Milestones and open research challenges

    Get PDF
    In this paper, we discuss the state of the art of (mobile) multi-hop ad hoc networking with the aim to present the current status of the research activities and identify the consolidated research areas, with limited research opportunities, and the hot and emerging research areas for which further research is required. We start by briefly discussing the MANET paradigm, and why the research on MANET protocols is now a cold research topic. Then we analyze the active research areas. Specifically, after discussing the wireless-network technologies, we analyze four successful ad hoc networking paradigms, mesh networks, opportunistic networks, vehicular networks, and sensor networks that emerged from the MANET world. We also present an emerging research direction in the multi-hop ad hoc networking field: people centric networking, triggered by the increasing penetration of the smartphones in everyday life, which is generating a people-centric revolution in computing and communications

    Emerging technologies for learning (volume 1)

    Get PDF
    Collection of 5 articles on emerging technologies and trend

    New media and the challenges of Boko Haram terrorism: proposing the adoption of human-wearable digital technology

    Get PDF
    The Boko Haram terrorism, which began in 2009 has had a devastating impact on the society. So far, it has triggered one of the worst humanitarian crises in history and has been responsible for over 30 thousand deaths with over two million others displaced, mostly in the North-east of the country with sizeable spillovers into the neighboring countries of Chad, Niger and Cameroon. Boko Haram’s primary goal was to create an Islamic caliphate in the region, and like other terrorist networks, uses the unconventional, hit-and-run guerrilla war tactics. This has rendered the insurgency to be a hard nut to crack, a phenomenon that is cited as one of the main reasons the group is able to continually carry out successful attacks despite being declared “technically defeated”. Hence, this need to seek for alternative, ‘unconventional’ media as a tool for counterterrorism. The media, both new and traditional have been shown to play a critical role toward the de-Bokoharamization campaign of the Nigerian Federal Government in collaboration with its Western partners. However, due to the guerrilla tactics nature of the insurgency, human-wearable digital microchip technology such as radio frequency identification and wireless body area network systems have been suggested as capable of yielding desirable outcomes. Following a critical review of literature and taking from Laswell’s communication model, this review article offers a digital communication counterterrorism model to complement the state’s efforts toward the anti-terrorism campaign

    The Court, FCC and Internet Policy: Partly with

    Get PDF
    The paper aims to explore the contour of internet regulation with a thread of Brand X , which navigates through constitutionalism, separation of powers, as well as business and economic or political implications enshrined behind it. An exemplary insight with the Korean case was adverted that could lead to the comparative perspective of internet law and regulation for the future research. The research was conducted by employing qualitative investigation, mainly relying on textual analysis and documentary examination. The outcome of research generally corroborates with our assumption that i) the increasing administrative state will variegate the traditional interplay of three branches, ii) expert bureaucracy stands at the core of policy shaping because of the necessary new concept of market and policy specialization, iii) the role of US government is not only pioneering, but also influential as a regulator, but comparatively with differing national jurisdictions if not a negligible implications on the international competition or even conflict

    5G-PPP Technology Board:Delivery of 5G Services Indoors - the wireless wire challenge and solutions

    Get PDF
    The 5G Public Private Partnership (5G PPP) has focused its research and innovation activities mainly on outdoor use cases and supporting the user and its applications while on the move. However, many use cases inherently apply in indoor environments whereas their requirements are not always properly reflected by the requirements eminent for outdoor applications. The best example for indoor applications can be found is the Industry 4.0 vertical, in which most described use cases are occurring in a manufacturing hall. Other environments exhibit similar characteristics such as commercial spaces in offices, shopping malls and commercial buildings. We can find further similar environments in the media & entertainment sector, culture sector with museums and the transportation sector with metro tunnels. Finally in the residential space we can observe a strong trend for wireless connectivity of appliances and devices in the home. Some of these spaces are exhibiting very high requirements among others in terms of device density, high-accuracy localisation, reliability, latency, time sensitivity, coverage and service continuity. The delivery of 5G services to these spaces has to consider the specificities of the indoor environments, in which the radio propagation characteristics are different and in the case of deep indoor scenarios, external radio signals cannot penetrate building construction materials. Furthermore, these spaces are usually “polluted” by existing wireless technologies, causing a multitude of interreference issues with 5G radio technologies. Nevertheless, there exist cases in which the co-existence of 5G new radio and other radio technologies may be sensible, such as for offloading local traffic. In any case the deployment of networks indoors is advised to consider and be planned along existing infrastructure, like powerlines and available shafts for other utilities. Finally indoor environments expose administrative cross-domain issues, and in some cases so called non-public networks, foreseen by 3GPP, could be an attractive deployment model for the owner/tenant of a private space and for the mobile network operators serving the area. Technology-wise there exist a number of solutions for indoor RAN deployment, ranging from small cell architectures, optical wireless/visual light communication, and THz communication utilising reconfigurable intelligent surfaces. For service delivery the concept of multi-access edge computing is well tailored to host virtual network functions needed in the indoor environment, including but not limited to functions supporting localisation, security, load balancing, video optimisation and multi-source streaming. Measurements of key performance indicators in indoor environments indicate that with proper planning and consideration of the environment characteristics, available solutions can deliver on the expectations. Measurements have been conducted regarding throughput and reliability in the mmWave and optical wireless communication cases, electric and magnetic field measurements, round trip latency measurements, as well as high-accuracy positioning in laboratory environment. Overall, the results so far are encouraging and indicate that 5G and beyond networks must advance further in order to meet the demands of future emerging intelligent automation systems in the next 10 years. Highly advanced industrial environments present challenges for 5G specifications, spanning congestion, interference, security and safety concerns, high power consumption, restricted propagation and poor location accuracy within the radio and core backbone communication networks for the massive IoT use cases, especially inside buildings. 6G and beyond 5G deployments for industrial networks will be increasingly denser, heterogeneous and dynamic, posing stricter performance requirements on the network. The large volume of data generated by future connected devices will put a strain on networks. It is therefore fundamental to discriminate the value of information to maximize the utility for the end users with limited network resources
    • 

    corecore