141 research outputs found

    Comnet: Annual Report 2013

    Get PDF

    Comnet: Annual Report 2012

    Get PDF

    Toward a Unified Theory of Access to Local Telephone Systems

    Get PDF
    One of the most distinctive developments in telecommunications policy over the past few decades has been the increasingly broad array of access requirements regulatory authorities have imposed on local telephone providers. In so doing, policymakers did not fully consider whether the justifications for regulating telecommunications remained valid. They also allowed each access regime to be governed by its own pricing methodology and set access prices in a way that treated each network component as if it existed in isolation. The result was a regulatory regime that was internally inconsistent, vulnerable to regulatory arbitrage, and unable to capture the interactions among network elements that give networks their distinctive character. In this Article, Professors Daniel Spulber and Christopher Yoo trace the development of these access regimes and evaluate the extent to which the emergence of competition among local telephone providers has undercut the rationales traditionally invoked to justify regulating local telephone networks (e.g., natural monopoly, network economic effects, vertical exclusion, and ruinous competition). They then apply a five-part framework for classifying different types of access that models the interactions among different network components. This framework demonstrates the impact of different types of access on network configuration, capacity, reliability, and cost. The framework also demonstrates how mandated access can increase transaction costs by forcing local telephone providers to externalize functions that would be more efficiently provided within the boundaries of the firm

    Toward a Unified Theory of Access to Local Telephone Networks

    Get PDF
    The Enduring Lessons of the Breakup of AT&T: A Twenty-Five Year Retrospective. \u27 Conference held at the University of Pennsylvania Law School on April 18-19, 2008. Over the past several decades, regulatory authorities have imposed an increasingly broad array of access requirements on local telephone providers. In so doing, policymakers typically applied previous approaches to access regulation without fully considering whether the regulatory justifications used in favor of those previous access requirements remained valid. They also allowed each access regime to be governed by a different pricing methodology and set access prices in a way that treated each network component as if it existed in isolation. The result was a regulatory regime that was internally inconsistent and vulnerable to regulatory arbitrage. In this Article, Professors Daniel Spulber and Christopher Yoo trace the development of these access regimes and evaluate the continuing validity of the rationales traditionally invoked to justify mandating access to local telephone networks (e.g., natural monopoly, network economic effects, vertical exclusion, and ruinous competition) in a world in which competition among local telephone providers is a real possibility. They then apply a five-part framework for classifying different types of access based on the branch of mathematics known as graph theory that models the interactions among different components. This framework shows how different types of access can have a differential impact on network configuration, capacity, reliability, and cost. It also captures the extent to which networks constitute complex systems in which network components interact with one another in ways that can make network behavior quite unpredictable. In addition, the framework demonstrates how mandated access can increase transaction costs by forcing local telephone providers to externalize functions that would be more efficiently provided within the boundaries of the firm

    5G-PPP Technology Board:Delivery of 5G Services Indoors - the wireless wire challenge and solutions

    Get PDF
    The 5G Public Private Partnership (5G PPP) has focused its research and innovation activities mainly on outdoor use cases and supporting the user and its applications while on the move. However, many use cases inherently apply in indoor environments whereas their requirements are not always properly reflected by the requirements eminent for outdoor applications. The best example for indoor applications can be found is the Industry 4.0 vertical, in which most described use cases are occurring in a manufacturing hall. Other environments exhibit similar characteristics such as commercial spaces in offices, shopping malls and commercial buildings. We can find further similar environments in the media & entertainment sector, culture sector with museums and the transportation sector with metro tunnels. Finally in the residential space we can observe a strong trend for wireless connectivity of appliances and devices in the home. Some of these spaces are exhibiting very high requirements among others in terms of device density, high-accuracy localisation, reliability, latency, time sensitivity, coverage and service continuity. The delivery of 5G services to these spaces has to consider the specificities of the indoor environments, in which the radio propagation characteristics are different and in the case of deep indoor scenarios, external radio signals cannot penetrate building construction materials. Furthermore, these spaces are usually “polluted” by existing wireless technologies, causing a multitude of interreference issues with 5G radio technologies. Nevertheless, there exist cases in which the co-existence of 5G new radio and other radio technologies may be sensible, such as for offloading local traffic. In any case the deployment of networks indoors is advised to consider and be planned along existing infrastructure, like powerlines and available shafts for other utilities. Finally indoor environments expose administrative cross-domain issues, and in some cases so called non-public networks, foreseen by 3GPP, could be an attractive deployment model for the owner/tenant of a private space and for the mobile network operators serving the area. Technology-wise there exist a number of solutions for indoor RAN deployment, ranging from small cell architectures, optical wireless/visual light communication, and THz communication utilising reconfigurable intelligent surfaces. For service delivery the concept of multi-access edge computing is well tailored to host virtual network functions needed in the indoor environment, including but not limited to functions supporting localisation, security, load balancing, video optimisation and multi-source streaming. Measurements of key performance indicators in indoor environments indicate that with proper planning and consideration of the environment characteristics, available solutions can deliver on the expectations. Measurements have been conducted regarding throughput and reliability in the mmWave and optical wireless communication cases, electric and magnetic field measurements, round trip latency measurements, as well as high-accuracy positioning in laboratory environment. Overall, the results so far are encouraging and indicate that 5G and beyond networks must advance further in order to meet the demands of future emerging intelligent automation systems in the next 10 years. Highly advanced industrial environments present challenges for 5G specifications, spanning congestion, interference, security and safety concerns, high power consumption, restricted propagation and poor location accuracy within the radio and core backbone communication networks for the massive IoT use cases, especially inside buildings. 6G and beyond 5G deployments for industrial networks will be increasingly denser, heterogeneous and dynamic, posing stricter performance requirements on the network. The large volume of data generated by future connected devices will put a strain on networks. It is therefore fundamental to discriminate the value of information to maximize the utility for the end users with limited network resources

    UNDERSTANDING THE DRIVERS AND CONSEQUENCES OF INTERACTIVE INNOVATION ADOPTION IN HEALTH AND MEDICINE

    Get PDF
    Providing technologies and services to enable collaboration and communication is a vital concern for information scientists and organizational leaders supporting communities of professionals in research-intensive health care environments. Innovative information practices and technologies—which may include mobile and social-media based technologies, new electronic records systems, new data management practices, and new communication procedures—are developed and introduced, often at considerable cost, with the goal of supporting and enhancing information sharing. However, at times these innovations fail to be adopted by their intended user communities, or adoption leads to unforeseen negative consequences for information sharing within the social environment. The health care sector in particular, while often characterized as generally innovative, has at times been slow to adopt new information innovations. This is a seeming paradox for innovation adoption studies, in which innovativeness is typically treated as synonymous with being among the first to adopt an innovation. This research was conducted in order to better understand the factors that influence or impede interactive innovation adoption in research-intensive health care environments. A four quadrant model, the Pollock Model of Interactive Innovation Adoption (PMIIA) was created and tested in a study of innovation adoption among physicians in training at an academic medical center in the southern United States. Factors from all four quadrants of the model were found to be related to either adoption decisions or perceptions of innovations. Additionally, both personal and professional values were found to play a role in participants\u27 adoption and use of the innovations

    A Survey on Intelligent Internet of Things: Applications, Security, Privacy, and Future Directions

    Get PDF
    peer reviewedThe rapid advances in the Internet of Things (IoT) have promoted a revolution in communication technology and offered various customer services. Artificial intelligence (AI) techniques have been exploited to facilitate IoT operations and maximize their potential in modern application scenarios. In particular, the convergence of IoT and AI has led to a new networking paradigm called Intelligent IoT (IIoT), which has the potential to significantly transform businesses and industrial domains. This paper presents a comprehensive survey of IIoT by investigating its significant applications in mobile networks, as well as its associated security and privacy issues. Specifically, we explore and discuss the roles of IIoT in a wide range of key application domains, from smart healthcare and smart cities to smart transportation and smart industries. Through such extensive discussions, we investigate important security issues in IIoT networks, where network attacks, confidentiality, integrity, and intrusion are analyzed, along with a discussion of potential countermeasures. Privacy issues in IIoT networks were also surveyed and discussed, including data, location, and model privacy leakage. Finally, we outline several key challenges and highlight potential research directions in this important area

    Automatic construction, maintenance, and optimization of dynamic agent organizations

    Get PDF
    The goal of this dissertation is to generate organizational structures that increase the overall performance of a multiagent coalition, subject to the system's complex coordination requirements and maintenance of a certain operating point. To this end, a generalized framework capable of producing distributed approximation algorithms based on the new concept of multidirectional graph search is proposed and applied to a family of connectivity problems. It is shown that a wide variety of seemingly unrelated multiagent organization problems live within this family. Su cient conditions are identi ed in which the approach is guaranteed to discover a solution that is within a constant factor of the cost of the optimal solution. The procedure is guaranteed to require no more than linear|and in some well de ned cases logarithmic|communication rounds. A number of examples are given as to how the framework can be applied to create, maintain, and optimize multiagent organizations in the context of real world problems. Finally, algorithmic extensions are introduced that allow for the framework to handle problems in which the agent topology and/or coordination constraints are dynamic, without signi cant consequences to the general runtime, memory, and quality guarantees.Ph.D., Computer Science -- Drexel University, 201

    Race, Class, Risk and Trust: Risk Communication in Post-Katrina New Orleans

    Get PDF
    The main focus of this study is on risk communication about dangerous environmental events in post-Katrina New Orleans, and the influence that race and class have on that process. It seeks to determine the assessment of New Orleans residents of the various possible sources of risk information that are available to them, and how race and socioeconomic class affect their level of trust in those sources. A 37-question telephone survey was conducted in Orleans Parish by the Public Policy Research Lab at Louisiana State University in June and July of 2012. There were 414 completed surveys, with 278 landline telephone and 136 cell phone respondents. The overall margin of error was +/- 4.8% at a 95% confidence interval. SPSS software was used to analyze data testing four hypotheses for each of two research questions on risk assessment: the first on race, the second on class (socioeconomic status, or SES ). An ANCOVA was used to test the hypotheses of the first research question, while Pearson\u27s Product Moment Correlation Coefficient Test was used to test the second. A trust index was constructed by aggregating Likert-scales responses to questions on the elements of trust in sources, and an SES index was constructed by aggregating education and income responses. After controlling for SES, Whites were shown to have significantly more trust in mass media, local community leaders and spokespersons, and interpersonal communication than Blacks did. After controlling for race, SES was found to be negatively correlated with trust in local TV news, non-news websites, and social media sites. Tests of correlation were also run on frequency of media use and trust in sources of risk messages
    • …
    corecore