20 research outputs found

    Identification of Technologies for Provision of Future Aeronautical Communications

    Get PDF
    This report describes the process, findings, and recommendations of the second of three phases of the Future Communications Study (FCS) technology investigation conducted by NASA Glenn Research Center and ITT Advanced Engineering & Sciences Division for the Federal Aviation Administration (FAA). The FCS is a collaborative research effort between the FAA and Eurocontrol to address frequency congestion and spectrum depletion for safety critical airground communications. The goal of the technology investigation is to identify technologies that can support the longterm aeronautical mobile communication operating concept. A derived set of evaluation criteria traceable to the operating concept document is presented. An adaptation of the analytical hierarchy process is described and recommended for selecting candidates for detailed evaluation. Evaluations of a subset of technologies brought forward from the prescreening process are provided. Five of those are identified as candidates with the highest potential for continental airspace solutions in L-band (P-34, W-CDMA, LDL, B-VHF, and E-TDMA). Additional technologies are identified as best performers in the unique environments of remote/oceanic airspace in the satellite bands (Inmarsat SBB and a custom satellite solution) and the airport flight domain in C-band (802.16e). Details of the evaluation criteria, channel models, and the technology evaluations are provided in appendixes

    Arquitectura de red de acceso móvil de cuarta generación : mobile-IP RAN

    Get PDF
    Esta tesis aborda el problema de las arquitecturas de acceso radio, en el ámbito de las redes móviles de cuarta generación definidas en entornos de movilidad IP. Uno de los principales beneficios del uso estas propuestas es la simplificación de la red móvil, haciéndola menos dependiente de la tecnología de acceso radio, y por ende permitiendo el uso de una red troncal común a las diferentes tecnologías radio existentes. En estas redes, la movilidad del terminal, la infraestructura de red y la seguridad son los aspectos más importantes que se han tomado en consideración en su diseño. A pesar de los avances en la investigación y estandarización de los mecanismos de movilidad basados en IP, existen aún limitaciones en la funcionalidad ofrecida por las redes de acceso radio propuestas. Estas limitaciones se refieren a servicios de la red de acceso radio, que no son específicos al nivel de red (IP), pero que deben ofrecerse por la red para el correcto funcionamiento de los servicios generales de la red móvil, e incluyen los servicios de gestión de los recursos radio, movilidad (handover), sincronización de usuario y red, descubrimiento de servicios y cálculo de la posición del móvil. El objetivo principal de esta tesis es la definición de una red de acceso radio basada en IP móvil que integre las principales funciones de las redes de acceso móvil de tercera generación y aquellas consideradas de cuarta generación. Esta nueva arquitectura permite compartir la infraestructura de acceso radio entre las distintas tecnologías radio existentes, simplificando la red y los costos asociados. Asimismo, los proveedores de servicios móviles podrán incorporar de forma integrada nuevas tecnologías radio, sin necesidad de añadir más infraestructura que la equivalente a las estaciones base. Las aportaciones principales de esta tesis, dentro del objetivo general, se pueden resumir de la siguiente manera. En primer lugar, se definen los requisitos que debe cumplir la red de acceso móvil de cuarta generación, en cuanto a los servicios de red y usuario proporcionados. La segunda aportación, y considerada la aportación principal, es la definición de una arquitectura de red de acceso basada en IPv6 móvil, denominada Mobile-IP RAN, que incluye la definición de los elementos de red que la componen, así como sus interfaces y protocolos, que permite ofrecer los servicios de acceso a la red, movilidad de usuario, transferencia de datos, sincronización y localización de usuarios. Como parte de la arquitectura, se define, a través de diagramas de secuencia de mensajes, el comportamiento dinámico de las principales funciones proporcionadas por la red de acceso propuesta. Por último, se lleva a cabo la evaluación de los modelos de movilidad, de determinación de la posición (como parte del servicio de localización de usuario) y de sincronización propuestos, analizando sus parámetros fundamentales que permitan optimizar el desempeño de estos modelos, así como su aplicabilidad en las distintas redes de acceso radio. ______________________________________________This thesis approaches the architecture of radio access networks in the context of fourth generation mobile networks, these being defined in IP mobility environments. One of the main benefits of these proposals is the simplification of the mobile network, now less dependent of the radio access technologies, and allowing the use of a common core network for all existing radio technologies. On these proposals, user mobility, network infrastructure and security are main aspects considered on the design. In spite of the advances on research and standardization of the IP-based mobility mechanisms, there are still limitations in the features offered by the proposed radio access networks. These limitations refers to radio access network service features, not specific to the (IP) network layer, but necessary for the correct operation of the general network and user services, that includes radio resource management, mobility (e.g. handover), network and user synchronization, service discovery and user position calculation. The main objective of this thesis is the definition of a radio access network architecture based on Mobile IPv6 that integrates the main features of the third-generation mobile access networks and those of the fourth generation. This architecture allows the use of the radio access infrastructure among the different existing radio access technologies, simplifying the network and its associated costs. Moreover, with this architecture, mobile service providers may incorporate new radio technologies in a seamless way, without adding more infrastructure than the base stations. The main contributions of this work can be summarized as follows. First, we define the requirements of the fourth-generation radio access networks related to the network and user services provided. Second, and considered the main contribution of this thesis, is the definition of a Mobile-IPv6 based radio access network architecture, named Mobile-IP RAN, that includes the definition of its network elements, as well as its network interfaces and protocols, that allow services including network access, user mobility, user data transfer, synchronization and location services. As part of the architecture, and through the use of Message Sequence Charts, we define the dynamic behavior of the main features offered by the proposed access network. Last, we perform the evaluation of the proposed mobility, position determination and synchronization models, analyzing their main parameters as well as their applicability in different radio access networks

    Security-centric analysis and performance investigation of IEEE 802.16 WiMAX

    Get PDF
    fi=vertaisarvioitu|en=peerReviewed

    Broadband Strategies Handbook

    Get PDF

    A framework for secure mobile computing in healthcare

    Get PDF
    Mobile computing is rapidly becoming part of healthcare’s electronic landscape, helping to provide better quality of care and reduced cost. While the technology provides numerous advantages to the healthcare industry, it is not without risk. The size and portable nature of mobile computing devices present a highly vulnerable environment, which threaten the privacy and security of health information. Since these devices continually access possibly sensitive healthcare information, it is imperative that these devices are considered for security in order to meet regulatory compliance. In fact, the increase in government and industry regulation to ensure the privacy and security of health information, makes mobile security no longer just desirable, but mandatory. In addition, as healthcare becomes more aware of the need to reinforce patient confidence to gain competitive advantage, it makes mobile security desirable. Several guidelines regarding security best practices exist. Healthcare institutions are thus faced with matching the guidelines offered by best practices, with the legal and regulatory requirements. While this is a valuable question in general, this research focuses on the aspect of considering this question when considering the introduction of mobile computing into the healthcare environment. As a result, this research proposes a framework that will aid IT administrators in healthcare to ensure that privacy and security of health information is extended to mobile devices. The research uses a comparison between the best practices in ISO 17799:2005 and the regulatory requirements stipulated in HIPAA to provide a baseline for the mobile computing security model. The comparison ensures that the model meets healthcare specific industry requirement and international information security standard. In addition, the framework engages the Information Security Management System (ISMS) model based on the ISO 27000 standard. The framework, furthermore, points to existing technical security measurers associated with mobile computing. It is believed that the framework can assist in achieving mobile computing security that is compliant with the requirements in the healthcare industry

    A framework for secure mobile computing in healthcare

    Get PDF
    Mobile computing is rapidly becoming part of healthcare’s electronic landscape, helping to provide better quality of care and reduced cost. While the technology provides numerous advantages to the healthcare industry, it is not without risk. The size and portable nature of mobile computing devices present a highly vulnerable environment, which threaten the privacy and security of health information. Since these devices continually access possibly sensitive healthcare information, it is imperative that these devices are considered for security in order to meet regulatory compliance. In fact, the increase in government and industry regulation to ensure the privacy and security of health information, makes mobile security no longer just desirable, but mandatory. In addition, as healthcare becomes more aware of the need to reinforce patient confidence to gain competitive advantage, it makes mobile security desirable. Several guidelines regarding security best practices exist. Healthcare institutions are thus faced with matching the guidelines offered by best practices, with the legal and regulatory requirements. While this is a valuable question in general, this research focuses on the aspect of considering this question when considering the introduction of mobile computing into the healthcare environment. As a result, this research proposes a framework that will aid IT administrators in healthcare to ensure that privacy and security of health information is extended to mobile devices. The research uses a comparison between the best practices in ISO 17799:2005 and the regulatory requirements stipulated in HIPAA to provide a baseline for the mobile computing security model. The comparison ensures that the model meets healthcare specific industry requirement and international information security standard. In addition, the framework engages the Information Security Management System (ISMS) model based on the ISO 27000 standard. The framework, furthermore, points to existing technical security measurers associated with mobile computing. It is believed that the framework can assist in achieving mobile computing security that is compliant with the requirements in the healthcare industry

    Intelligent Circuits and Systems

    Get PDF
    ICICS-2020 is the third conference initiated by the School of Electronics and Electrical Engineering at Lovely Professional University that explored recent innovations of researchers working for the development of smart and green technologies in the fields of Energy, Electronics, Communications, Computers, and Control. ICICS provides innovators to identify new opportunities for the social and economic benefits of society.  This conference bridges the gap between academics and R&D institutions, social visionaries, and experts from all strata of society to present their ongoing research activities and foster research relations between them. It provides opportunities for the exchange of new ideas, applications, and experiences in the field of smart technologies and finding global partners for future collaboration. The ICICS-2020 was conducted in two broad categories, Intelligent Circuits & Intelligent Systems and Emerging Technologies in Electrical Engineering

    Cartographic user interface design models for mobile Location-Based Services applications

    Get PDF
    Mobile Location-Based Services (mLBS) offer a unique combination of digital content, portability, interactivity, location-awareness and real-time information delivery, providing increased convenience and support for everyday geospatial decision-making tasks, compared to more traditional printed maps and digital cartographic products. In spite of their benefits, however, limitations inherent within mLBS technology (e.g. small screens), along with the dynamic and changeable contexts in which they are used, impact on their effectiveness for communicating geospatial information to end users and, in turn, their overall acceptance. Identifying usefulness (i.e. utility and usability) as a key factor influencing the acceptance of mLBS products, this thesis details the investigation of techniques and a methodology for designing mLBS applications that communicate geospatial information in a useful manner to non-expert, general public users. The research presented here focuses on the usefulness of the entire cartographic user interface (UI) for mLBS applications – i.e. those components that are specifically concerned with the access and representation of, and interaction with, geospatial information – differentiating it from related mLBS research and application design. Particular emphasis was placed on the usefulness of the interplay between various geospatial components of the cartographic UI, in support of a broad range of everyday geospatial tasks for non-expert users. Contributing to this, a wide array of alternative techniques for representing, presenting and interacting with geospatial information were explored. To achieve its aims, the study adopted a qualitative User-Centred Design (UCD) methodology, involving an early focus on users and their tasks, empirical measurement of usage, and iterative design and evaluation, which together ensured that all design efforts were firmly grounded in the needs and characteristics of the end users. Necessarily focused on a specific application area (tourism) and an associated user group (travellers), the UCD process employed by the research was more comprehensive than had previously been undertaken within the cartographic discipline. The primary results of the research comprise a set of cartographic UI design models for communicating geospatial information in a useful manner to the non-expert users of a tourism-related mLBS application. These incorporate a range of alternative cartographic representation, presentation and interaction techniques considered useful by representative users, with egocentric maps arguably holding the greatest importance. The wider benefits of the design models are expected to be twofold: firstly, they offer a structural foundation to researchers and developers seeking to produce useful cartographic UIs for tourism-related mLBS applications; and secondly, they provide guidance regarding specific cartographic representation, presentation and interaction techniques that offer utility and usability in particular contexts. In addition, a number of secondary research outputs offer other benefits to the scientific and commercial mLBS communities. These include the UCD research methodology – which presents a proven guide for ensuring usefulness during the design of mLBS applications in general – and a set of general recommendations for designing useful mLBS applications – which offer assistance for specific design activities while contributing empirical results to the future development of mLBS application design guidelines
    corecore