CAN RESIDENTIAL WIRELESS LANS PLAY A ROLE IN 4G? *

Size: px
Start display at page:

Download "CAN RESIDENTIAL WIRELESS LANS PLAY A ROLE IN 4G? *"

Transcription

1 CAN RESIDENTIAL WIRELESS LANS PLAY A ROLE IN 4G? * Elias C. Efstathiou and George C. Polyzos Mobile Multimedia Laboratory Department of Computer Science Athens University of Economics and Business Athens 10434, Greece {efstath, polyzos}@aueb.gr Abstract We present a P2P scheme that could fuel the deployment of free public wireless LANs (WLANs) in cities; these WLANs would complement existing and future cellular networks. We call our scheme the P2P Wireless Network Confederation (P2PWNC). Unlike existing approaches, P2PWNC does not rely on central planning or altruistic groups. In P2PWNC, wireless service is provided to those who provide service to others based on an algorithm that detects non simultaneous exchanges, which runs in isolation on every peer. This indirect reciprocity algorithm resists the Sybil attack and promotes cooperation without relying on trusted authorities, persistent identities, or tamperproof modules. In this paper, we present P2PWNC as another component of the emerging 4G landscape. 1. Introduction 1 The market for IEEE wireless LANs (WLANs) is growing fast. Worldwide, thousands of WLAN hotspots are providing Internet access to the public. Cellular network operators are collaborating with public hotspot operators to form roaming associations [1]. WLAN clients are being integrated into cell phones [2]. Municipalities are also deploying and operating citywide WLANs: the City of Philadelphia announced its relevant business * This research is supported by the project "Mobile Multimedia Communications" (EP ), funded by the research program "Herakleitos--Fellowships for Research at the Athens University of Economics and Business," which is co-financed by the Ministry of National Education and Religious Affairs of Greece and the European Union, through the program "EPEAEK II." model (labeled Cooperative Wholesale ) on April 2005 [3]. Smaller towns, especially in rural areas, have already succeeded in offering inexpensive (even free) wireless broadband access to their inhabitants [4]. Today, it is generally accepted that WLAN and 3G technologies will coexist, and that this coexistence will be one of the defining characteristics of the 4G wireless landscape. Even with all the publicity that is currently surrounding WLAN technologies, there is still not enough emphasis being placed on the fact that public WLANs can be deployed by practically anyone. A WLAN access point is an inexpensive device that operates in unlicensed frequency bands. A broadband Internet subscriber that attaches an access point to his home Internet connection can cover his own home and a substantial part of the area surrounding it with WLAN signals. We shall attempt to make a prediction: in the near future, most WLAN signals will come from residential WLANs that are attached to home broadband connections, i.e. not from hotspots that are controlled by commercial operators. Today, these spillover signals are generally considered a security risk and owners of home WLANs are advised to secure their networks against outsiders by using cryptographic methods at the link or at higher layers (e.g. through the use of IPsec, TLS/SSL, or application-level encryption). Currently, at least in metropolitan areas, numerous WLAN access points are in operation. Recently, a U.S. company [5] announced its Wi-Fi Positioning System (WPS). Unlike GPS, which uses dedicated satellites and does not function indoors, the WPS system relies on a database that stores the geographical locations of thousands of WLAN access

2 points across 25 major U.S. cities. A WPS-enabled device (an IEEE enabled device can become WPS-enabled with a simple software update) can detect nearby access points, identify them using their Service Set beacons, and use triangulation techniques and the WLAN location information in the database in order to pinpoint a person s geographical location with a 20-meter accuracy. This database of accesspoint locations is constantly being updated and contains access points owned and operated not only by public hotspot operators but also access points that are part of home and office networks. Therefore, residential WLANs are already being used to provide a public service, and without necessarily their owners explicit consent. Our proposal in this paper is to take the idea of relying on residential WLANs to its logical conclusion. We shall present a scheme that can explicitly take advantage of a city s residential WLANs, uniting them in a citywide ad hoc roaming association. We call the scheme Peer-to-Peer Wireless Network Confederation (P2PWNC). In the P2PWNC scheme, a city s broadband Internet subscribers are given incentives to share their Internet connections with their peers, i.e. with other broadband subscribers. The sharing of Internet connections with passersby incurs both direct and indirect costs, so, in exchange, a participating peer who shares his connection earns the right to access the broadband connections owned by other P2PWNC peers whenever he happens to be away from his own home connection. All connection sharing is enabled by WLAN technology: peers within range of a peer s residential WLAN can access that peer s Internet connection using any mobile WLAN client such as a WLAN-enabled cell phone. Participating peers can thus rely on P2PWNC and use it as a low-cost alternative to standard (2G/3G) cellular service. With appropriate security software (e.g. VPN software than forwards all traffic through a trusted home server), and with the appropriate Voice-over-IP functionality, the videophones of the near future could use any access point that participates in a city s P2PWNC system in order to access the Internet and make or receive calls. All this would happen practically for free, as long as the peer owns a P2PWNC-enabled home access point that extends the same courtesy to his P2PWNC peers who request it, which is the characteristic of most of the successful peer-to-peer schemes (P2P) that are in operation today. Unlike the WPS location service we described above, making an access point part of a P2PWNC system incurs costs, as we mentioned above. P2PWNC is a P2P scheme that relies on the sharing of resources, (here: wireless bandwidth and bandwidth to the Internet) and has many similarities to common P2P file sharing schemes. As in most P2P schemes that assume selfish peers, cooperation among peers must somehow be encouraged. This is necessary because altruism alone will probably not be enough: each peer that participates in P2PWNC faces both real costs (if he is on a metered Internet connection for example), and opportunity costs (e.g. increased delay for one s own traffic due to the forwarding of traffic for others, the possibility of exposure to security risks, and others). The altruistic peers that do not care about these costs are probably few in number compared to the set of potential P2PWNC participants. 2. System requirements Cooperation in P2PWNC is promoted through an incentive-based mechanism. However, most of the relevant mechanisms proposed in the literature cannot be applied directly because of three additional design constraints that we choose to place on a P2PWNC system. These three constraints are presented below. 1) P2PWNC peer identities are zero-cost. Peers do not have to possess identities that are certified by a Trusted Third Party, which can somehow be linked to their real-world identity. P2PWNC peers simply create their own identities locally. This means that a P2PWNC system can be fully self-organized, which could make its spontaneous deployment in densely populated urban areas more likely. All peers in P2PWNC have equivalent roles and no authorities are assumed (not even distributed ones). This absence of any hierarchical structure is what will probably distinguish P2PWNC and other 4G systems from the telecommunication architectures of today. Zero-cost identities encourage fast system growth; however, it is known that collusion-based attacks can be trivially launched in electronically mediated communities when a logically centralized authority is absent [6]. A

3 peer can generate any number of unique identities and collude with himself in order to build an arbitrary-sized virtual coalition that could launch massive collusion-based attacks. We shall return to this issue in Section 4. 2) P2PWNC must be able to handle asymmetry of interest and untraceable defections (a defection is simply a refusal to cooperate). This means that it may be common in P2PWNC for a peer A to consume resources from a peer B and never get the chance to repay B, but only other peers. Also, it may be common for a peer C not to provide resources to peer D, but peer D may have no way of knowing that C could have provided resources. These two problems mean that strategies which belong to the popular Tit- For-Tat family of strategies (originally studied by Axelrod [7]) cannot be used to promote cooperation in the P2PWNC setting because peers may not interact repeatedly and symmetrically, and because only positive (i.e. cooperative) actions can be reliably traced. 3) Peer selfishness not only discourages peers from sharing the higher-level P2PWNC resource (wireless bandwidth and bandwidth to the Internet). Peer selfishness may also affect the P2PWNC system at a lower level. The operation of P2PWNC relies on accounting information that circulates through the system and is stored by the peers themselves. It is normally assumed that peers do not use tamperproof software or hardware; therefore, peers can always choose to be uncooperative at this accounting sublayer by trying to save the storage space and the bandwidth that would be required in order to respond to accounting queries. P2PWNC is designed in such a way, therefore, so that peers store and communicate accounting information only when it is in their interest. The issue of providing appropriate incentives at the accounting level is frequently overlooked in other pure (i.e. fully distributed) P2P system proposals [8, 9]. 3. System entities A P2PWNC system is composed of WLAN Access Points (APs) and WLAN clients. We assume that each peer owns and operates one AP, which is attached to an always-on broadband Internet connection. Also, each peer owns a mobile WLAN client, which he uses to access the Internet through APs that belong to other peers. We assume a peer can communicate, securely, using his client, with his AP over the Internet. For example, the two devices may share a common secret key and the client should also be aware of the AP s public IP address whether dynamic or static. Each peer generates a unique identity for himself; this identity is a locally generated publicprivate key pair. The public key (PK) is stored in the AP and in the client. The private key (SK, or secret key) is stored in the client only. Peers use their SKs to sign receipts whenever they consume WLAN resources from other peers. A receipt is a record of the corresponding WLAN session. Receipts contain: The PK of the providing peer. The PK of the consuming peer. A timestamp, noting the WLAN session s start time. The total amount of (egress and ingress) traffic forwarded by the providing AP during the entire session. The consuming peer s signature signing all the above. This signature is a hash of the above 4 fields, encrypted with the consuming peer s SK. Receipts are generated as follows: during a WLAN session, the AP periodically (e.g. once a minute) sends Receipt Requests to all connected clients. If a client wishes to continue with its WLAN session, it must sign a receipt. The providing peer s PK is included in Receipt Requests, and the client can calculate all the remaining receipt data. Upon receiving a receipt, the AP will: Verify the signature using the consuming peer s PK (included in the receipt). Verify that the amount of traffic corresponds to the amount of traffic forwarded in that session so far.

4 Verify that the timestamp is correct and equal to the session s start time. APs and clients can agree on the timestamp because we assume they are loosely synchronized. Receipts represent the proofs that peers use in order to show to other peers that they now deserve to be served because they contributed their resources in the (recent) past. Peers cannot take advantage of more than one receipt from the same session because all these receipts have the same timestamp. However, zero-cost identities present a serious problem: peers can easily generate any number of fake identities and fake receipts without doing any useful work for the system. Below we will give a brief overview of a family of strategies that peers can follow in order to avoid servicing this type of colluders. These strategies provide peers with the appropriate incentives to cooperate in order to raise their standing and receive service from other peers in the future (who will, in turn, service them for the exact same reason). 4. Peer strategy A typical strategy from the strategy family we referred to previously (first mentioned in [9]) is this: Peer P (provider), upon receiving a request from peer C (consumer), accesses the P2PWNC receipt graph, and cooperates (i.e. offers service) with a probability equal to: P = min{ 1, maxflow(p to C) / maxflow(c to P) } where maxflow() is the result of the Maximum Flow graph algorithm. A family of strategies that are based on maxflow has been shown [9, 10] to promote cooperation and to be collusion-resistant under specific collusion scenarios. Our ongoing work addresses additional collusion scenarios and other more sophisticated attacks. In the P2PWNC receipt graph, vertices are peer public keys (PKs) and edges point from the consuming peer to the providing peer. An edge s weight is the amount of traffic recorded on the corresponding receipt. A chain of receipts starting from P and ending at C indicates that P has consumed, directly or indirectly, from C in the past; therefore, C should be rewarded for his contribution to the community. Also, all the signatures on the receipt chain that is part of the maxflow can be verified: P verifies the signature on the first receipt using his own PK, and then uses the providing peer s PK in each receipt to verify the signature on the next receipt. Essentially, by taking indirect consumption into account in this manner, the asymmetry of interest problem is mitigated [9]. How do we realize the receipt graph in a distributed manner? Because of peer selfishness at the accounting level (see Section 2), it is difficult for peers to share a global view of the receipt graph; however, it is possible for each peer to have a partial view of it. More specifically, each peer AP maintains 3 receipt repositories: IR (incoming receipts), OR (outgoing receipts), and RR (random receipts). IR and OR contain receipts for sessions in which the peer was directly involved as provider (IR) or consumer (OR). When a peer C visits peer P (actually, visits P s AP) and requests service, C communicates to P s AP the contents of C s IR and RR repositories; the maxflow algorithm is then run on the combined repositories. P then uses C s IR and RR to populate his own RR repository. Performing this gossiping has been shown [10] to be in the interest of C. For gossiping to work, a peer s client must also communicate regularly with the peer s AP in order to report new outgoing receipts, and in order to receive updates of IR and RR. All three repositories have a maximum size. During repository updates, if their size limit is reached, the oldest receipt is replaced. IR s and RR s size is important because their contents are also communicated to clients. However, if we use an Elliptic Curve Cryptography-based signature scheme, a receipt can be less than 100 bytes long, which means that even cell phone P2PWNC clients can carry thousands of receipts. In conclusion, the P2PWNC distributed accounting mechanism uses clients to circulate

5 accounting data, exploiting their mobility, much like a similar algorithm that was first presented in [11]. Thus, no communication between (distrusting) P2PWNC APs is required. 5. Simulation results We used the evolutionary learning framework established in [9] to evaluate the maxflow strategy presented above and its partial view of the receipt graph. We let the peers be randomly paired for games, which are grouped in rounds. In each round, all peers get one chance to provide service, and lose 1 point if they do so, and one chance to consume, and gain 7 points if the providing peer cooperates 1. Every peer follows a strategy, and can change his strategy (evolve) at the end of each round with probability p learn = In that case, he will pick the strategy (from the 3 available, see below) that currently has the highest rating, and will adopt it with probability proportional to the difference in rating between that strategy and his own strategy. A strategy s rating is the average of the running averages of scores per round of its followers, with each term weighted according to how many rounds a peer has been using the strategy [9]. The 3 available strategies are: and only attempt to consume. For the measurements below, each data point corresponds to 500 rounds of play, with the population always starting from 1/3 AC followers, 1/3 NC followers, and 1/3 maxflow followers, who may then change their behavior according to the social learning process described above. All WLAN sessions are assumed to be equivalent, meaning that receipt (edge) weights always equal 1. We varied the population size from 100 to 1000 peers. We set the size of OR and IR to 20 receipts (which is extremely small, corresponding to approximately 4kB of information), and we used two RR sizes: 0 and 20. RR size 0 means that no secondhand information is available to peers and that peers rely solely on their own first-hand observations. RR size 20 means that clients carry the same amount of first-hand (IR) and second-hand (RR) information 40 receipts total (approx. 4kB); we see (Figure 1, below) that cooperation levels improve considerably with this extra second-hand information: the maximum mean overall score per round is 6 (7 minus 1), and is achieved if everybody always cooperates. As populations increase, it is difficult to maintain this level of cooperation (since IR and RR sizes remain the same), however, we see that second-hand information, even if only partial, can improve the level of cooperation. Always Cooperate (AC) Never Cooperate (NC), and the maxflow-based strategy. Their only difference is that AC followers cooperate irrespectively of what the maxflow algorithm outputs, and NC followers never cooperate 1 These numbers are not completely arbitrary: for cooperation to be established at equilibrium, the cost of performing a cooperative act (in absolute terms) needs to be less than the benefit of being on the receiving side of a cooperative act. If these values were the same, peers would be indifferent regarding longterm cooperation because this type of costly cooperation would not improve their evolutionary fitness in the long run. We borrow these specific numbers from [9]. Results would be qualitatively the same for a wide range of benefit-to-cost ratios that are higher than 1:1. These numbers should capture the realworld costs of offering access over the residential WLAN and the benefit of not having to pay cellular operators for their services. Mean Score / Round The value of second-hand information RR =0 RR = Population (in hundreds) Figure 1: As population size increases, cooperation levels fall, but with the addition of second-hand information peers are able to maintain higher cooperation levels.

6 6. Related work and conclusions We presented a scheme that explicitly takes advantage of residential WLANs and gives incentives to their owners to share these WLANs among each other. In the near future, in dense urban areas where most households will own a broadband Internet connection and a home WLAN, such a scheme will allow users to exploit the underused resources of their peers instead of having to resort to the services of commercial 3G and hotspot operators. We believe that this peer-to-peer sharing of network resources, which has similarities to multi-hop network traffic forwarding (though in P2PWNC there is always only one intermediate relaying node), will be an important feature of emerging 4G wireless architectures. An earlier version of the peer strategy appears in [10]. The idea of using mobile clients to circulate data comes from [11]; there, it is used as a way to merge the PGP-like certificate repositories that mobile nodes are carrying. The theoretical work in [9] provided many insights and linked Axelrod s work on cooperation theory [8] with current research on pure peer-to-peer systems. Currently, we are analyzing the robustness of the system to several types of collusion-based attacks, as well as to Sybil attacks; we are also implementing a P2PWNC AP on top of the Linux-based Linksys WRT54GS AP to be used as reference implementation of the specific P2PWNC protocol that we are designing. We believe that the particular Linksys model, currently retailing for less than $70, is indicative of a wide range of AP devices that can be upgraded to run P2PWNC protocols with simple firmware updates. On the client side, supporting P2PWNC protocols is more straightforward (even small mobile clients like smart phones are, in general, more powerful than the Linksys AP). We believe that by specifying an open client-to-ap P2PWNC protocol, vendors of WLAN access points and clients will include the P2PWNC algorithm in their future firmware and driver updates. [2] The Motorola CN620 handset. [3] Wireless Philadelphia. [4] Municipal Wireless. [5] Skyhook Wireless. [6] J. Douceur, The Sybil attack, in Proc. IPTPS 02. [7] R. Axelrod, The Evolution of Cooperation, Basic Books, [8] S. Lee, R. Sherwood, B. Bhattacharjee, Cooperative peer groups in NICE, in Proc. IEEE INFOCOM [9] M. Feldman, K. Lai, I. Stoica, J. Chuang, Robust incentive techniques for peer-to-peer networks, in Proc. ACM EC 04. [10] E.C. Efstathiou and G.C. Polyzos, Self-organized peering of wireless LAN hotspots, European Transactions on Telecommunications (special issue on Self-Organization in Mobile Networking, in press). [11] S. Capkun, L. Buttyan, J.-P. Hubaux, Selforganized public key management for mobile ad hoc networks, IEEE Transactions on Mobile Computing, 2(1), References [1] Wireless Broadband Alliance.

Mesh Networking Principles

Mesh Networking Principles Technology, N. Jones Research Note 8 July 2003 Mesh Topologies Promise Resilient Wireless Networks Mesh architecture will become an essential element of wireless networking because it is easy to install,

More information

Wi-Fi Security for Next Generation Connectivity. Perry Correll Aerohive, Wi-Fi Alliance member October 2018

Wi-Fi Security for Next Generation Connectivity. Perry Correll Aerohive, Wi-Fi Alliance member October 2018 Perry Correll Aerohive, Wi-Fi Alliance member October 2018 1 Value of Wi-F1 The value Wi-Fi provides to the global economy rivals the combined market value of Apple Inc. and Amazon. The fact that Wi-Fi

More information

Reducing the Communication and Processing Overhead and Ensuring the Security in Multihop Wireless Networks - using RACE Mechanism

Reducing the Communication and Processing Overhead and Ensuring the Security in Multihop Wireless Networks - using RACE Mechanism International Journal of Modern Engineering Research (IJMER) www.ijmer.com Pp-87-91 ISSN: 2249-6645 Reducing the Communication and Processing Overhead and Ensuring the Security in Multihop Wireless Networks

More information

Building the Infrastructure

Building the Infrastructure WORLD IT FORUM ETHIOPIA WITFOR 2007 Building the Infrastructure The RURALMAYA project, (Comunidad Valenciana, Spain) 1 Strengthening Internet support in rural environments through wireless technologies

More information

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM R.Bhuvaneswari 1, V.Vijayalakshmi 2 1 M.Phil., Scholar, Bharathiyar Arts And Science College For Women, India 2 HOD

More information

Copyright 2011 Nomadix, Inc. All Rights Reserved Agoura Road Suite 102 Agoura Hills CA USA White Paper

Copyright 2011 Nomadix, Inc. All Rights Reserved Agoura Road Suite 102 Agoura Hills CA USA   White Paper Nomadix Service Engine Access in Large Public Venues Copyright 2011 Nomadix, Inc. All Rights Reserved. 30851 Agoura Road Suite 102 Agoura Hills CA 91301 USA www.nomadix.com 230-1026-001 Sheet 2 of 9 Introduction

More information

Distributed Sensing for Spectrum Agility: Incentives and Security Considerations

Distributed Sensing for Spectrum Agility: Incentives and Security Considerations Distributed Sensing for Spectrum Agility: Incentives and Security Considerations S. Arkoulis, P. Frangoudis, G. Marias, G. Polyzos Athens University of Economics and Business {arkoulistam,pfrag,marias,polyzos}@aueb.gr

More information

A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks

A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks BHARAT.VEERLA *1, and SREERAMA MURTHY #2 * Student, Dept of CSE, Sree Vahini Institute of Science and

More information

NKN is a new kind of network connectivity protocol & ecosystem powered by blockchain for an open, decentralized, and shared Internet.

NKN is a new kind of network connectivity protocol & ecosystem powered by blockchain for an open, decentralized, and shared Internet. A NEW KIND OF NETWORK NKN is a new kind of network connectivity protocol & ecosystem powered by blockchain for an open, decentralized, and shared Internet. W H Y Shortcomings of today s Internet The Missing

More information

The Emerging World of Broadband Public Private Partnerships. February 24, 2016 Coalition for Local Internet Choice

The Emerging World of Broadband Public Private Partnerships. February 24, 2016 Coalition for Local Internet Choice The Emerging World of Broadband Public Private Partnerships February 24, 2016 Coalition for Local Internet Choice Seeking understanding of priorities and goals Balance reward, risk, and control Potential

More information

Service Discovery and Provision for Autonomic Mobile Computing *

Service Discovery and Provision for Autonomic Mobile Computing * Service Discovery and Provision for Autonomic Mobile Computing * George C. Polyzos, Christopher N. Ververidis and Elias C. Efstathiou Mobile Multimedia Laboratory Department of Computer Science Athens

More information

Wireless Community Networks: Evolution and Technical Challenges

Wireless Community Networks: Evolution and Technical Challenges Wireless Community Networks: Evolution and Technical Challenges Luiz A. DaSilva Bradley Department of Electrical and Computer Engineering Workshop on Nationwide Internet Access and Online Applications

More information

wi4 Fixed Point-to-Multipoint Canopy Solutions

wi4 Fixed Point-to-Multipoint Canopy Solutions wi4 Fixed Point-to-Multipoint Canopy Solutions Canopy Technology is as Simple as it is Powerful The wi4 Fixed Point-to-Multipoint Canopy solution is streamlined, powerful and simple, with built-in installation

More information

[MS-NCT-Diff]: Network Cost Transfer Protocol. Intellectual Property Rights Notice for Open Specifications Documentation

[MS-NCT-Diff]: Network Cost Transfer Protocol. Intellectual Property Rights Notice for Open Specifications Documentation [MS-NCT-Diff]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation ( this documentation ) for protocols,

More information

LTE : The Future of Mobile Broadband Technology

LTE : The Future of Mobile Broadband Technology LTE : The Future of Mobile Broadband Technology Erick Setiawan tukangbajaksawah@gmail.com 1 Become a necessity today, where the wireless broadband technology needed to meet increasing expectations in terms

More information

This tutorial has been designed to help beginners understand the basic concepts of WiMAX.

This tutorial has been designed to help beginners understand the basic concepts of WiMAX. About the Tutorial WiMAX is one of the hottest broadband wireless technologies around today. It is based on IEEE 802.16 specification and it is expected to deliver high quality broadband services. This

More information

THE FUTURE ECONOMIC VALUE OF UNLICENSED SPECTRUM

THE FUTURE ECONOMIC VALUE OF UNLICENSED SPECTRUM THE FUTURE ECONOMIC VALUE OF UNLICENSED SPECTRUM Raul L. Katz Telecom Advisory Services, LLC What is the future of Wi-Fi? Mountain View, September 11, 2014 THE MEASUREMENT OF ECONOMIC VALUE OF UNLICENSED

More information

µ-operators, User-Provided, Community, and Cognitive Networks in Open Spectrum Access

µ-operators, User-Provided, Community, and Cognitive Networks in Open Spectrum Access µ-operators, User-Provided, Community, and Cognitive Networks in Open Spectrum Access George C. Polyzos Mobile Multimedia Laboratory Department of Informatics/Computer Science Athens University of Economics

More information

Transform your bottom line: 5G Fixed Wireless Access

Transform your bottom line: 5G Fixed Wireless Access Transform your bottom line: 5G Fixed Wireless Access Transform Your Bottom Line: 5G Fixed Wireless Access 1 Seizing the opportunity of 5G with Fixed Wireless Access To get a sense of the future of broadband,

More information

MoB: A Mobile Bazaar for Wide Area Wireless Services. R.Chakravorty, S.Agarwal, S.Banerjee and I.Pratt mobicom 2005

MoB: A Mobile Bazaar for Wide Area Wireless Services. R.Chakravorty, S.Agarwal, S.Banerjee and I.Pratt mobicom 2005 MoB: A Mobile Bazaar for Wide Area Wireless Services R.Chakravorty, S.Agarwal, S.Banerjee and I.Pratt mobicom 2005 What is MoB? It is an infrastructure for collaborative wide-area wireless data services.

More information

CDMA450 - a low frequency radio based broadband solution in Värmland

CDMA450 - a low frequency radio based broadband solution in Värmland CDMA450 - a low frequency radio based broadband solution 1. Purpose of this document: The purpose of this document is to describe a best-practice case from all municipalities regarding wireless broadband

More information

Overview of Wi-Fi. Dr. Srikanth Subramanian CKO, Nanocell Networks Wi-Fi A Wireless Success Story

Overview of Wi-Fi. Dr. Srikanth Subramanian CKO, Nanocell Networks  Wi-Fi A Wireless Success Story Overview of Wi-Fi Dr. Srikanth Subramanian CKO, Nanocell Networks www.nanocellnetworks.com Wi-Fi A Wireless Success Story Wi-Fi present in all laptops/aps Wi-Fi Traffic trends Source: Cisco percentage

More information

Networks and Telecommunication

Networks and Telecommunication Networks and Telecommunication Assignment R. C. A. Wijeratne 07/AS/CI/032 EP594 WI-Fi Technology Introduction Wi-Fi is a mechanism for wirelessly connecting electronic devices. A device enabled with Wi-Fi,

More information

Fast Location-based Association of Wi-Fi Direct for Distributed Wireless Docking Services

Fast Location-based Association of Wi-Fi Direct for Distributed Wireless Docking Services Fast Location-based Association of Wi-Fi Direct for Distributed Wireless Docking Services Jina Han Department of Information and Computer Engineering Ajou University Suwon, South Korea hangn0808@ajou.ac.kr

More information

BBc-1 : Beyond Blockchain One - An Architecture for Promise-Fixation Device in the Air -

BBc-1 : Beyond Blockchain One - An Architecture for Promise-Fixation Device in the Air - BBc-1 : Beyond Blockchain One - An Architecture for Promise-Fixation Device in the Air - Kenji Saito and Takeshi Kubo {ks91 t-kubo}@beyond-blockchain.org Revision 0.1 October 31, 2017 1 Introduction Blockchain

More information

Seeking understanding of priorities and goals

Seeking understanding of priorities and goals Seeking understanding of priorities and goals u Balance reward, risk, and control u Potential priorities include: u Ubiquity/universal service u Consumer choice/competition u Community competitiveness

More information

White paper. Combatant command (COCOM) next-generation security architecture

White paper. Combatant command (COCOM) next-generation security architecture Combatant command () next-generation security architecture using NSA Suite B Table of Contents Combatant command () next-generation security architecture using NSA Suite B NSA Commercial Solution for Classified

More information

An Architecture. What the MEC? for 5G

An Architecture. What the MEC? for 5G An Architecture What the MEC? for 5G What the MEC? An architecture for 5G As we stated in the first e-book in this series, the evolution from LTE to 5G will be the most profound transformation on the wireless

More information

Peer Assisted Content Distribution over Router Assisted Overlay Multicast

Peer Assisted Content Distribution over Router Assisted Overlay Multicast Peer Assisted Content Distribution over Router Assisted Overlay Multicast George Xylomenos, Konstantinos Katsaros and Vasileios P. Kemerlis Mobile Multimedia Laboratory & Department of Informatics Athens

More information

The SafeNet Security System Version 3 Overview

The SafeNet Security System Version 3 Overview The SafeNet Security System Version 3 Overview Version 3 Overview Abstract This document provides a description of Information Resource Engineering s SafeNet version 3 products. SafeNet version 3 products

More information

Do incentives build robustness in BitTorrent?

Do incentives build robustness in BitTorrent? Do incentives build robustness in BitTorrent? ronghui.gu@yale.edu Agenda 2 Introduction BitTorrent Overview Modeling Altruism in BitTorrent Building BitTyrant Evaluation Conclusion Introduction 3 MAIN

More information

[MS-NCT-Diff]: Network Cost Transfer Protocol. Intellectual Property Rights Notice for Open Specifications Documentation

[MS-NCT-Diff]: Network Cost Transfer Protocol. Intellectual Property Rights Notice for Open Specifications Documentation [MS-NCT-Diff]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation ( this documentation ) for protocols,

More information

Vivato Based VoIP. Introduction. Open Platform. Scalable. Wireless LAN Components. Application: Wi-Fi Base Station

Vivato Based VoIP. Introduction. Open Platform. Scalable. Wireless LAN Components. Application: Wi-Fi Base Station Vivato Based VoIP Application: Wi-Fi Base Station roduction 82. (Wi-Fi) wireless local area networks (WLANs) have enjoyed enormous growth over the last few years. With that growth Wi-Fi has expanded into

More information

Naresh Soni CTO, InterDigital

Naresh Soni CTO, InterDigital March 5, 2012 WTC 2012 Challenges and Innovations in LTE Deployment Naresh Soni CTO, InterDigital Agenda InterDigital Overview Key Trends Key Challenges in LTE Innovative Solutions for LTE Deployment Summary

More information

As a 3rd generation currency, not only are transactions secured, private and fast, you actually get paid for holding DigitalPrice coins.

As a 3rd generation currency, not only are transactions secured, private and fast, you actually get paid for holding DigitalPrice coins. Introduction With the circulation of cryptocurrency becoming common, there is a need for additional information. The scope of this white paper is to provide that information. If you are under the impression

More information

Whitepaper Rcoin Global

Whitepaper Rcoin Global Whitepaper Rcoin Global SUMMARY 1. Introduction 2. What is Rcoin Global? 3. Transactions 4. Hybrid Network Concept 5. Keepers 6. Incentive 7. Smart Contract Token 8. Token Distribution 9. Rcoin Global

More information

It is the process of sharing data, programs, and information between two or more computers.

It is the process of sharing data, programs, and information between two or more computers. 1 Communications It is the process of sharing data, programs, and information between two or more computers. Numerous applications depend on communication systems: E-mail Instant messaging (IM) Internet

More information

Delivering the Wireless Software-Defined Branch

Delivering the Wireless Software-Defined Branch Delivering the Wireless Software-Defined Branch By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Cradlepoint Executive Summary Operations at the branch, critical to many distributed organizations,

More information

To Study the Usage & Awareness of M- Commerce and its services with reference to Nagpur City

To Study the Usage & Awareness of M- Commerce and its services with reference to Nagpur City To Study the Usage & Awareness of M- Commerce and its services with reference to Nagpur City Prof. Prerna Thakwani Assistant Professor, Dept. of MBA, Tirpude Institute of Management Education, Nagpur,

More information

The Economic Benefits of a Cooperative Control Wireless LAN Architecture

The Economic Benefits of a Cooperative Control Wireless LAN Architecture White Paper The Economic Benefits of a Cooperative Control Wireless LAN Architecture Aerohive Networks, Inc. 3150-C Coronado Avenue Santa Clara, California 95054 Phone: 408.988.9918 Toll Free: 1.866.918.9918

More information

General System Requirements MCS Apps

General System Requirements MCS Apps General System Requirements MCS Apps Document status Document owner LIVE Thomas Verdyck Goals Get insight on the minimal hardware & software requirements needed for running an app of the MCS Software suite.

More information

Chapter 2. Literature Survey. 2.1 Remote access technologies

Chapter 2. Literature Survey. 2.1 Remote access technologies Chapter 2 Literature Survey This chapter presents a brief report on literature reviewed in context to present work with an aim to identify current state of research in the domain. Literature review is

More information

Wireless technology Principles of Security

Wireless technology Principles of Security Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the

More information

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems Technical Overview of in Windows 7 and Windows Server 2008 R2 Microsoft Windows Family of Operating Systems Published: January 2009 This document supports a preliminary release of a software product that

More information

Cooperation in Open Distributed Systems. Stefan Schmid

Cooperation in Open Distributed Systems. Stefan Schmid Cooperation in Open Distributed Systems Stefan Schmid T-Labs, Berlin, July 2, 2009 Distributed Systems 2008/9 Wireless: Many mobile phones today have WLAN (and even Skype) P2P: Olympic games 2008 live-broadcast

More information

Achieving End-to-End Security in the Internet of Things (IoT)

Achieving End-to-End Security in the Internet of Things (IoT) Achieving End-to-End Security in the Internet of Things (IoT) Optimize Your IoT Services with Carrier-Grade Cellular IoT June 2016 Achieving End-to-End Security in the Internet of Things (IoT) Table of

More information

MA R K E TING R E PORT. The Future of Passive Optical Networking is Here NG-PON2

MA R K E TING R E PORT. The Future of Passive Optical Networking is Here NG-PON2 MA R K E TING R E PORT The Future of Passive Optical Networking is Here NG-PON2 NG-PON2 The future of Passive Optical Networking is Here Introduction...3 The Evolution of Passive Optical Networking...4

More information

09. Mobile Commerce. Contents. Mobile Computing and Commerce

09. Mobile Commerce. Contents. Mobile Computing and Commerce 09. (Contents) Mobile Commerce Contents 09. Mobile Commerce Mobile Computing and Commerce Code: 166140-01+02 Course: Electronic Commerce Period: Autumn 2011 Professor: Sangwon Lee, Ph.D. 1 09. (Contents)

More information

ENEE 457: E-Cash and Bitcoin

ENEE 457: E-Cash and Bitcoin ENEE 457: E-Cash and Bitcoin Charalampos (Babis) Papamanthou cpap@umd.edu Money today Any problems? Cash is cumbersome and can be forged Credit card transactions require centralized online bank are not

More information

802.11n in the Outdoor Environment

802.11n in the Outdoor Environment POSITION PAPER 802.11n in the Outdoor Environment How Motorola is transforming outdoor mesh networks to leverage full n advantages Municipalities and large enterprise customers are deploying mesh networks

More information

ZIGBEE. Erkan Ünal CSE 401 SPECIAL TOPICS IN COMPUTER NETWORKS

ZIGBEE. Erkan Ünal CSE 401 SPECIAL TOPICS IN COMPUTER NETWORKS ZIGBEE Erkan Ünal CSE 401 SPECIAL TOPICS IN COMPUTER NETWORKS OUTLINE ZIGBEE AND APPLICATIONS IEEE 802.15.4 PROTOCOL ZIGBEE PROTOCOL ZIGBEE ALLIANCE ZIGBEE APPLICATIONS PHYSICAL LAYER MAC LAYER ZIGBEE

More information

Harness the Power of Policy on Device

Harness the Power of Policy on Device Harness the Power of Policy on Device The Power of Policy on Device How do you respond to an insatiable demand for always-on, lightning-fast wireless data by millions of mobile users? Policy-on-Device

More information

INTRODUCTION OUR SERVICES

INTRODUCTION OUR SERVICES INTRODUCTION OUR SERVICES Conduct aims to revolutionise the South African telecommunications market by building a trusted, open-access, optical network in the last mile. We deploy carrier neutral, dark

More information

SEVEN Networks Open Channel Traffic Optimization

SEVEN Networks Open Channel Traffic Optimization SEVEN Networks Open Channel Traffic Optimization Revision 3.0 March 2014 The Open Channel family of software products is designed to deliver device-centric mobile traffic management and analytics for wireless

More information

Chapter 13. Digital Cash. Information Security/System Security p. 570/626

Chapter 13. Digital Cash. Information Security/System Security p. 570/626 Chapter 13 Digital Cash Information Security/System Security p. 570/626 Introduction While cash is used in illegal activities such as bribing money laundering tax evasion it also protects privacy: not

More information

Automating VPN Management

Automating VPN Management Automating VPN Management By Scott Hilton, Vice President Product Management Assured Digital, Inc. Although many network managers, users and executives agree on the benefits of virtual private networking,

More information

Smart Islands, Intelligent Nations. Carlyle Roberts, Bahamas Telecommunications Company August 1 st, 2016

Smart Islands, Intelligent Nations. Carlyle Roberts, Bahamas Telecommunications Company August 1 st, 2016 Smart Islands, Intelligent Nations Carlyle Roberts, Bahamas Telecommunications Company August 1 st, 2016 Technology: Constantly Evolving Evolutionary Path Technology: Creating a new world Evolutionary

More information

Mesh Wide Area Network AP Elevating Bandwidth to the n th Power

Mesh Wide Area Network AP Elevating Bandwidth to the n th Power Mesh Wide Area Network AP 7181 Elevating Bandwidth to the n th Power GENERATION n The advent of 802.11n technology has forever changed the face of indoor and outdoor wireless networks alike. Delivering

More information

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks A Security Whitepaper January, 2004 Photo courtesy of NASA Image exchange. Image use in no way implies endorsement by NASA of any of the

More information

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 7, Issue 6, November-December 2016, pp. 96 100, Article ID: IJECET_07_06_014 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=7&itype=6

More information

Public Consultation on the BEREC Work Programme 2018

Public Consultation on the BEREC Work Programme 2018 BoR PC06 (17) 07 Public Consultation on the BEREC Work Programme 2018 EOLO SpA response INTRODUCTION EOLO welcomes the draft BEREC Work Programme 2018 for its forward-looking character, and thanks BEREC

More information

Submission. to the. Australian Communications and Media Authority. on the. Cellular mobile repeaters a proposed regulatory approach

Submission. to the. Australian Communications and Media Authority. on the. Cellular mobile repeaters a proposed regulatory approach Submission to the Australian Communications and Media Authority on the Cellular mobile repeaters a proposed regulatory approach Submission by: Australian Mobile Telecommunications Association and Communications

More information

23 Must-Have WiFi Features

23 Must-Have WiFi Features 23 Must-Have WiFi Features Installing, updating or expanding a WiFi network can seem complicated because of the long list of features available and the always-evolving nature of technology. The point of

More information

Trust-Propagation Based Authentication Protocol in Multihop Wireless Home Networks

Trust-Propagation Based Authentication Protocol in Multihop Wireless Home Networks Trust-Propagation Based Authentication Protocol in Multihop Wireless Home Networks Han Sang Kim, Jin Wook Lee*, Sandeep K. S. Gupta and Yann-Hang Lee Department of Computer Science and Engineering Arizona

More information

ÉNERGIE ET RADIOSCIENCES

ÉNERGIE ET RADIOSCIENCES ÉNERGIE ET RADIOSCIENCES Cognitive Green Radio for Energy-Aware Communications Malek Naoues, Quentin Bodinier, Jacques Palicot CentraleSupélec/ IETR, {malek.naoues,quentin.bodinier,jacques.palicot}@centralesupelec.fr

More information

Welcome to today s Tele Track,

Welcome to today s Tele Track, Welcome to today s Tele Track, Cisco's Express Mobility Solution hosted by: Comstor For the audio portion of this event, please call: 1-877-522-7671 Conference ID# 18803143 Conference Features Questions

More information

DATASHEET Pepwave Mesh Connector

DATASHEET Pepwave Mesh Connector Features Vendor Neutral Repeater, Interoperability Certified The allows you to seamlessly extend the coverage of an existing Wi-Fi network, without messy configurations or having to run cables! Simply

More information

Samsung Security AP WHITE PAPER

Samsung Security AP WHITE PAPER WHITE PAPER Introduction Due to their high speed and standardized features such as enhanced authentication and encryption, enterprise WLAN network systems are currently growing in their use as infrastructure

More information

IMT-2000 vs. Fixed Wireless Access (FWA) systems. The 3G/UMTS Proposition

IMT-2000 vs. Fixed Wireless Access (FWA) systems. The 3G/UMTS Proposition IMT-2000 vs. Fixed Wireless Access (FWA) systems Regional Workshop for the Arab Region on Guidelines on the smooth transition of existing mobile networks to IMT-2000 for Developing Countries Jean-Pierre

More information

WZRDnet. A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments. February 14, 2018

WZRDnet. A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments. February 14, 2018 White Paper TELEGRID Technologies, Inc. WZRDnet A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments February 14, 2018 23 Vreeland Road Suite 290 Florham Park, NJ 07932 www.telegrid.com

More information

OpenWay by Itron Security Overview

OpenWay by Itron Security Overview Itron White Paper OpenWay by Itron OpenWay by Itron Security Overview Kip Gering / R. Eric Robinson Itron Marketing / Itron Engineering 2009, Itron Inc. All rights reserved. 1 Executive Summary 3 Intent

More information

Protocol for Tetherless Computing

Protocol for Tetherless Computing Protocol for Tetherless Computing S. Keshav P. Darragh A. Seth S. Fung School of Computer Science University of Waterloo Waterloo, Canada, N2L 3G1 1. Introduction Tetherless computing involves asynchronous

More information

A Brief Comparison of Security Patterns for Peer to Peer Systems

A Brief Comparison of Security Patterns for Peer to Peer Systems A Brief Comparison of Security Patterns for Peer to Peer Systems Rahul J. Vaghela 1, Kalpesh Patel 2 1 PG Student, Department of Computer Engineering, L.D. College Of Engineering, Gujarat Technological

More information

Getting a Better Broadband Service Guide

Getting a Better Broadband Service Guide Getting a Better Broadband Service Guide Contents What is the scheme for?... 2 What are my other options for Better Broadband?... 2 What will the scheme provide?... 3 Where can I find more information

More information

Wireless Network Security Fundamentals and Technologies

Wireless Network Security Fundamentals and Technologies Wireless Network Security Fundamentals and Technologies Rakesh V S 1, Ganesh D R 2, Rajesh Kumar S 3, Puspanathan G 4 1,2,3,4 Department of Computer Science and Engineering, Cambridge Institute of Technology

More information

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 38 A Tutorial on Network Protocols

More information

Smart Sustainable Cities. Trends and Real-World Opportunities

Smart Sustainable Cities. Trends and Real-World Opportunities Smart Sustainable Cities Trends and Real-World Opportunities Role Of The GSMA WE ARE THE GLOBAL INDUSTRY VOICE SHAPING THE FUTURE OF MOBILE INDUSTRY FORUM POLICY ADVOCATE MARKET THINK TANK BUSINESS CATALYST

More information

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005 Network and Telecommunications Basics Chapter Outline The telecommunications system Network services

More information

Notes for Lecture 24

Notes for Lecture 24 U.C. Berkeley CS276: Cryptography Handout N24 Luca Trevisan April 21, 2009 Notes for Lecture 24 Scribed by Milosh Drezgich, posted May 11, 2009 Summary Today we introduce the notion of zero knowledge proof

More information

Operationalizing Seamless Mobility through Service Delivery Platforms

Operationalizing Seamless Mobility through Service Delivery Platforms Operationalizing Seamless Mobility through Service Delivery Platforms Chand Gundecha Motorola Networks Senior Marketing Manager, Seamless Mobility Mobile Telephone (312) 307-0677 E-mail: Chand.Gundecha@motorola.com

More information

5. Mobile voice and data services

5. Mobile voice and data services 5. Mobile voice and data services 5.1 Our expectation of mobile services is changing as we become more dependent on mobile services and need to access them wherever we are indoors, outdoors or on the move.

More information

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks 1 S.Nandhini, 2 Mr.S.Franson Varun Richo, 1 PG Student, 2 Assistant professor, Francis Xavier Engineering college,

More information

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS S. P. Manikandan 1, R. Manimegalai 2 and S. Kalimuthu 3 1 Department of Computer Science and Engineering, Sri Venkateshwara

More information

Case Study: Tshwane Proof of Concept

Case Study: Tshwane Proof of Concept Case Study: Tshwane Proof of Concept Overview Background Goals Implementation Results Implications Opportunities Conclusion Background Who is Neology Vendor, Distributor and Integrator to Operators, ISP

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK PEER-TO-PEER FILE SHARING WITH THE BITTORRENT PROTOCOL APURWA D. PALIWAL 1, PROF.

More information

A WIDE-OPEN, WIRELESS WORLD

A WIDE-OPEN, WIRELESS WORLD JAN FEB MAR 2017 AMERICAN BUILDERS QUARTERLY A WIDE-OPEN, WIRELESS WORLD Alex Gamota and American Tower are playing a greater role in their clients growth and in a constantly evolving wireless-communications

More information

A Lightweight Blockchain Consensus Protocol

A Lightweight Blockchain Consensus Protocol A Lightweight Blockchain Consensus Protocol Keir Finlow-Bates keir@chainfrog.com Abstract A lightweight yet deterministic and objective consensus protocol would allow blockchain systems to be maintained

More information

Human history is a history of connections. Embracing mobile networks in the 5G era. Three challenges. Perspectives

Human history is a history of connections. Embracing mobile networks in the 5G era. Three challenges. Perspectives Perspectives Embracing mobile networks in the 5G era By Edward Deng, President of Huawei Wireless Solution Human history is a history of connections. The pursuit of communication promotes the development

More information

VISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks

VISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks Rev.Confirming Pages VISUAL SUMMARY Communications and Networks COMMUNICATIONS COMMUNICATION CHANNELS Communications is the process of sharing data, programs, and information between two or more computers.

More information

Carrier Solution. Carrier Solution. Carrier-class Wi Fi. Highly scalable mobile operator Wi Fi solution

Carrier Solution. Carrier Solution. Carrier-class Wi Fi. Highly scalable mobile operator Wi Fi solution Carrier Solution Carrier Solution Carrier-class Wi Fi Highly scalable mobile operator Wi Fi solution SKSpruce provides a carrier Wi-Fi solution to complement LTE buildout in dense urban environments End-to-end

More information

PeerApp Case Study. November University of California, Santa Barbara, Boosts Internet Video Quality and Reduces Bandwidth Costs

PeerApp Case Study. November University of California, Santa Barbara, Boosts Internet Video Quality and Reduces Bandwidth Costs PeerApp Case Study University of California, Santa Barbara, Boosts Internet Video Quality and Reduces Bandwidth Costs November 2010 Copyright 2010-2011 PeerApp Ltd. All rights reserved 1 Executive Summary

More information

Simplify IP Telephony with System i. IBM System i IP Telephony

Simplify IP Telephony with System i. IBM System i IP Telephony Simplify IP Telephony with System i IBM System i IP Telephony Highlights Deploy a complete IP telephony suite on one easy-to-manage system, or even part of a system, shared with other applications Integrate

More information

Investor Presentation. May 2010

Investor Presentation. May 2010 Investor Presentation May 2010 Disclaimer This presentation has been prepared by SK Telecom Co., Ltd. ( the Company ). This presentation is being presented solely for your information and is subject to

More information

Via

Via Howard Slawner 350 Bloor Street East, 6th Floor Toronto, ON M4W 0A1 howard.slawner@rci.rogers.com o 416.935.7009 m 416.371.6708 Via email: ic.spectrumengineering-genieduspectre.ic@canada.ca Senior Director

More information

Connected & Smart Home Research Package

Connected & Smart Home Research Package TECHNOLOGY, MEDIA & TELECOMMUNICATION KEY COMPONENTS Intelligence Services Real-time access to continually updated market data and forecasts, analyst insights, topical research reports and analyst presentations.

More information

NIS Standardisation ENISA view

NIS Standardisation ENISA view NIS Standardisation ENISA view Dr. Steve Purser Brussels, 19 th September 2017 European Union Agency for Network and Information Security Instruments For Improving Cybersecurity Policy makers have a number

More information

Mobile Commerce. Electronic Commerce

Mobile Commerce. Electronic Commerce Mobile Commerce Electronic Commerce Code: 008023-01+02 Course: Electronic Commerce Period: Autumn 2013 Professor: Sync Sangwon Lee, Ph. D D. of Information & Electronic Commerce 1 00. Contents 01. Mobile

More information

Authentication,Authorization and Accounting in Hybrid Ad hoc Networks. By, Venkata Vamshi

Authentication,Authorization and Accounting in Hybrid Ad hoc Networks. By, Venkata Vamshi Authentication,Authorization and Accounting in Hybrid Ad hoc Networks By, Venkata Vamshi Overview WLAN a popular Technology. Hybrid Ad hoc Networks, A solution to WLAN Independent Access Authentication

More information

Personal Handyphone Systems in Urban Infrastructure

Personal Handyphone Systems in Urban Infrastructure Personal Handyphone Systems in Urban Infrastructure Yukio Iino Mitsunobu Ootsuka Isao Shimbo ABSTRACT: The personal handyphone system (PHS) service began in Japan in 1995. As this new communication service

More information

Simple Channel-Change Games for Spectrum- Agile Wireless Networks

Simple Channel-Change Games for Spectrum- Agile Wireless Networks 1 Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 5 th, 26 Simple Channel-Change Games for Spectrum- Agile Wireless Networks Roli G. Wendorf and Howard Blum Abstract The proliferation

More information