126,833 research outputs found

    The geopolitical hijacking of open networking: the case of Open RAN

    Get PDF
    This article investigates how discourses on open networking technologies provide a social imaginary that industry and government actors mobilize in an attempt to expand their control over mobile telecommunications networks. The case of recent initiatives aiming to ‘open up’ radio access network (or RAN, a key component of telecommunications infrastructure) with an ‘open RAN’ model reveals how the US Government came to promote this nascent technology to create an opposition between its own ‘open’ telecommunications networks versus proprietary and presumed ‘untrustworthy’ networks based on foreign equipment, namely Huawei. While a closer look casts doubts on the benefits of open radio access network to increase network security or to open up the equipment market, this case reveals how openness is an ambiguous notion that can be used by governments to exclude foreign trade enemies, while advocating for trust in telecommunications networks

    Power‐Over‐Fiber Applications for Telecommunications and for Electric Utilities

    Get PDF
    Beyond telecommunications, optical fibers can also transport optical energy to powering electric or electronic devices remotely. This technique is called power over fiber (PoF). Besides the advantages of optical fiber (immunity to electromagnetic interferences and electrical insulation), the employment of a PoF scheme can eliminate the energy supplied by metallic cable and batteries located at remote sites, improving the reliability and the security of the system. Smart grid is a green field where PoF can be applied. Experts see smart grid as the output to a new technological level seeks to incorporate extensively technologies for sensing, monitoring, information technology, and telecommunications for the best performance electrical network. On the other hand, in telecommunications, PoF can be used in applications, such as remote antennas and extenders for passive optical networks (PONs). PoF can make them virtually passives. We reviewed the PoF concept, its main elements, technologies, and applications focusing in access networks and in smart grid developments made by the author’s research group

    A framework for the formulation of security issues in the field of e-learning using Meta-Synthesis method

    Get PDF
    Application development and e-learning services in the context of communication networks and information along with qualitative and quantitative improvements of activities and services can expand some of threats which emergence in the networks of this infrastructure of telecommunications. Consequently, this is an inevitable necessity attention to accuracy and efficiency payment issues and security concerns to managers and decision makers. Based on other researches and effective experiences in the field of e-learning security, this research attempts to define a logical structure to security contents in this field. We have presented a three-dimensional model for security issues and requirements of e-learning, based on the findings of research. Actuarial three-dimensional model are infrastructure-oriented viewpoint; service-oriented viewpoint and customer-oriented viewpoint. Each of these three dimensions in this model has described in the form of model with two fields: e-learning issues and security of e-learning issues

    Free space optic communications – a review of quality parameters

    Get PDF
    The optical telecommunications have paved the way for a massive expansion in global telecommunications networks over the past few decades. There has been a tremendous explosion in bandwidth demand and requirements. For the end user to access and utilize the broad array of services made available through these developments, network designers must provide a flexible and cost-effective solution for the "last mile" between the LANs, MANs, or WANs. High bandwidth, rapid installation, higher security, and non-binding accessibility are some of the features that describe Free Space Optical (FSO) Technology. As such, FSO would be able and solve many problems faced by today's traditional wireless communications, from security, bandwidth limitations to last mile problem. Considering that FSO Technology uses optical signals, the performance of FSO links happen to be highly dependent on weather conditions more than microwave radio link

    Deploying QKD in Standard Optical Networks

    Full text link
    In order to deploy QKD in a cost effective and scalable way, its integration with already installed optical networks is a logical step. If, for the sake of security, we require that no intermediate trusted nodes would be needed, the maximum distance/absorptions allowed by QKD systems limit ourselves to metropolitan area networks. Current metro networks are mostly all optical and passive, hence a transparent link can be established among any two points and this link can be used to transport the quantum channel. In this poster we report on our findings studying the problems arising when integrating QKD systems in standard telecommunications networks

    Study and Implementation of 3G Mobile Security

    Get PDF
    In the last decade there has been an exponential rise in use of mobile devices. 3G is the latest mobile technology that is currently in widespread use. The Universal Mobile Telecommunications System (UMTS) is the most popular third generation mobile communication systems, which reposes on the popularity of the ‘second generation’ GSM system by introducing high quality services while retaining its essential and robust security features. Wireless communication is less secure, and mobility entails higher security risks than stationary devices. Security is the foremost concern in today’s mobile communication systems. Latest security mechanisms are needed to protect the singular features introduced in 3G technology. The security framework for 3G mobile networks is considered, and the various protocols for protection of the network access interface are studied and analyzed

    Modeling and control of complex dynamic systems: Applied mathematical aspects

    Get PDF
    The concept of complex dynamic systems arises in many varieties, including the areas of energy generation, storage and distribution, ecosystems, gene regulation and health delivery, safety and security systems, telecommunications, transportation networks, and the rapidly emerging research topics seeking to understand and analyse. Such systems are often concurrent and distributed, because they have to react to various kinds of events, signals, and conditions. They may be characterized by a system with uncertainties, time delays, stochastic perturbations, hybrid dynamics, distributed dynamics, chaotic dynamics, and a large number of algebraic loops. This special issue provides a platform for researchers to report their recent results on various mathematical methods and techniques for modelling and control of complex dynamic systems and identifying critical issues and challenges for future investigation in this field. This special issue amazingly attracted one-hundred-and eighteen submissions, and twenty-eight of them are selected through a rigorous review procedure

    Enhancing cryptographic protection, authentication, and authorization in cellular networks: a comprehensive research study

    Get PDF
    This research article provides an extensive analysis of novel methods of cryptographic protection as well as advancements in authentication and authorization techniques within cellular networks. The aim is to explore recent literature and identify effective authentication and authorization methods, including high-speed data encryption. The significance of this study lies in the growing need for enhanced data security in scientific research. Therefore, the focus is on identifying suitable authentication and authorization schemes, including blockchain-based approaches for distributed mobile cloud computing. The research methodology includes observation, comparison, and abstraction, allowing for a comprehensive examination of advanced encryption schemes and algorithms. Topics covered in this article include multi-factor authentication, continuous authentication, identity-based cryptography for vehicle-to-vehicle (V2V) communication, secure blockchain-based authentication for fog computing, internet of things (IoT) device mutual authentication, authentication for wireless sensor networks based on blockchain, new secure authentication schemes for standard wireless telecommunications networks, and the security aspects of 4G and 5G cellular networks. Additionally, in the paper a differentiated authentication mechanism for heterogeneous 6G networks blockchain-based is discussed. The findings presented in this article hold practical value for organizations involved in scientific research and information security, particularly in encryption and protection of sensitive data

    Managing ubiquitous eco cities: the role of urban telecommunication infrastructure networks and convergence technologies

    Get PDF
    A successful urban management system for a Ubiquitous Eco City requires an integrated approach. This integration includes bringing together economic, socio-cultural and urban development with a well orchestrated, transparent and open decision making mechanism and necessary infrastructure and technologies. Rapidly developing information and telecommunication technologies and their platforms in the late 20th Century improves urban management and enhances the quality of life and place. Telecommunication technologies provide an important base for monitoring and managing activities over wired, wireless or fibre-optic networks. Particularly technology convergence creates new ways in which the information and telecommunication technologies are used. The 21st Century is an era where information has converged, in which people are able to access a variety of services, including internet and location based services, through multi-functional devices such as mobile phones and provides opportunities in the management of Ubiquitous Eco Cities. This paper discusses the recent developments in telecommunication networks and trends in convergence technologies and their implications on the management of Ubiquitous Eco Cities and how this technological shift is likely to be beneficial in improving the quality of life and place. The paper also introduces recent approaches on urban management systems, such as intelligent urban management systems, that are suitable for Ubiquitous Eco Cities
    corecore