AWERProcedia Information Technology & Computer Science

Size: px
Start display at page:

Download "AWERProcedia Information Technology & Computer Science"

Transcription

1 AWERProcedia Information Technology & Computer Science 2 (2012) nd World Conference on Innovation and Computer Sciences An Assessment of Infrastructure Readiness for Private Telecommunication Companies in Yemen to Implement WiMax Network Ali Mohammed Al-Sharafi a *, Mohamed Othman b, Layla Ali Haj Said c a Department of Networks Technology & Computer Security, Sana'a University, Sana'a, Yemen b Department of Communication Technology and Network, Universiti Putra Malaysia, UPM Serdang, Selangor D.E., Malaysia c International College, University of Science and Technology, Sana'a, Yemen Abstract With progression in application of communications technology, the scope for deployment of WiMax (wireless interoperability microwave access) network is very promising, particularly in the developing countries. This paper examines infrastructure for private telecommunication companies (Sabafon, MTN, Y, and Yemen mobile) to deploy WiMax network in Yemen, from technical perspectives. This paper provides a glance on telecommunications companies and explores their readiness to deploy WiMax. Information was collected by a questionnaire to examine companies infrastructure to deploy WiMax, and to find out the overall readiness to implement it. However, their infrastructure need to develop and need equipment, also the core network needs to be improved. The findings of this paper will be useful to help companies to evaluate their infrastructure and try to introduce a new wireless networks Keywords: WiMax, Infrastructure Assessment. Selection and peer review under responsibility of Prof. Dr. Dogan Ibrahim Academic World Education & Research Center. All rights reserved. 1. Introduction Wireless networking technologies range from global voice and data networks (which allow users to establish wireless connections across long distances) to infrared light and radio frequency * ADDRESS FOR CORRESPONDENCE: Ali Mohammed,Al-Sharafi, Department of Networks Technology & Computer Security, Sana'a University, Sana'a, Yemen address: ali.alsharafi@gmail.com / Tel.:

2 technologies that are optimized for short-range wireless connections. Devices frequently used for wireless networking include portable computers, desktop computers, handheld computers, Personal Digital Assistant (PDA), cellular phones, pen-based computers, and pagers. Wireless technologies provide many practical purposes. For instance, mobile users can benefit from their cellular phone to access . Travelers with portable computers can reach out to the Internet over base stations installed in airports, railway stations, and other public locations. At home, users can reach out devices on their desktop to synchronize data and transfer files [1]. WiMax is implemented in many countries to provide such services. This paper introduces an exploration assessment study to measure the readiness for telecommunication companies in Yemen (one of the developing countries) to implement WiMax. The collection of information from private telecommunication companies (Sabafon, MTN, Y, and Yemen mobile) will help in determining whether these companies need to upgrade their infrastructure or not, does the cost of deploying this service worth the upgrade, and to check whether the cost of this service will be reasonable for customers. WiMax was chosen by the study to be the suitable wireless network can cover Yemen because it represents the next generation of wireless networking, filling the gap between Wireless LANs and wide area networks, WiMax-compliant systems will provide a cost effective fixed wireless alternative to conventional wire-line DSL and cable in areas where those technologies are readily available, and more importantly the WiMax technology can provide a cost-effective broadband access solution in areas beyond the reach of DSL and cable Telecommunication companies in Yemen In Yemen, there are four telecommunication companies, Sabafon which is the first GSM operator in Yemen was established in 2001, it uses 2G and 2.5G and now it covers 68% in Yemen [4]. Second company is MTN, formerly known as Yemen Spacetel. It was established at the end of 2001 [5]. Third company is Y. It was established in 2007, and its core network is 2.5 G, all the services it introduces are related to the second generation [6]. Last company is Yemen Mobile which established in 2004 [7]. First three are GSM companies and they are using 2G and 2.5G in their network, while the fourth company is CDMA company and it uses 3G infrastructure Related works Many similar researches had been conducted to study the possibility of deploying WiMax in some countries. According to [8], it appears to be the best general approach to follow the deployment of WiMax in Saudi Arabia. This came up with meeting the proposed marketing strategy and responding to the deployment issues in Saudi Arabia. Service providers can choose the combination of technologies, vendors and partners in order to meet the market requirements. This approach has a greater flexibility by way of variety of revenue generating services. The study provides useful approach into how WiMax could be marketed in Saudi Arabia. Authors in [9] looked for providing a comprehensive picture of WiMax development in India, focusing on the three aspects of policy, industry, and market. The researchers use survey to collect information on India's infrastructure and develop it to deploy WiMax network and they were used secondary resource for data, their article content comprehensive overview on WiMax and its standards, for future work. WiMax was successfully deployed in the United States [10]. The study was about deploying WiMax in the United State in LasVegas, Atlanta, and Grand Rapids, and how it faces the threat that can attack this network with some procedures to protect it. It covered how WiMax would allow customers a completely wire free network connection in their homes or businesses. WiMax would also provide better services for mobile devices. There are also some speculations for WiMax to be used in gaming consoles; nevertheless, Clear wire has successfully deployed WiMax to several cities in the US and has been the main WiMax service provider for the last few years. 420

3 2. Assessment Process The research followed survey study for the reason that nature of survey research can be best understood by comparing it to two other dominant methods in telecommunication: case studies and laboratory experiments. The quantitative approach was applied in this research, it was used to answer questions on relationships within measurable variables (telecommunication companies' infrastructure and possibility to implement WiMax network) with an intention to predict the phenomena if there is readiness in companies infrastructure to implement WiMax network in Yemen. Quantitative method typically begins with data collection based on variables that determined and questionnaire design to serve this study, and it was followed with application of explorative statistics. Independent variables (implement WiMax in telecommunication companies) and the dependent variables (standard WiMax infrastructure) were chosen dependence on standard found from the IEEE e Data collection For the purposes of the study, questionnaire was developed to measure and evaluate the readiness of telecommunication companies to implement WiMax network in Yemen. The questionnaire was developed to cover the objective of the study. The type of questionnaire's questions is explorative to get information about companies' infrastructure and their suitability to implement WiMax. 50 copies of the questionnaire were distributed on each telecommunication company, with total of 200 copies and they were distributed on five job degrees in companies. The questionnaire was chosen because it is inexpensive, easy to distribute, and the respondents can complete the questionnaire at their convenience. The received copies were 146 copies, with 73% from society Selecting a sample The research objectives and scope of the study are critical in defining the target population. The target population is the complete group of objects or elements relevant to the research project. They are relevant because they possess the required information the research project was designed to collect. The target populations in this research are the employees of telecommunication companies who they work in Transmission, BSS, Core, Radio, and Engineering departments, the definition of employees was influenced by knowledge of the topic of interest, access to elements, availability of elements and time frame Sample size The questionnaire was distributed on a simple random sampling; therefore it must be representative of the community better representation, and the sample size is appropriate for the size of the community. The size of sample is determine by formula: n = p*(1-p)/((p*(1-p)/n)+(a 2 /Z 2 )) (1) Where n = sample size N = population size p = Percentage of subject obvious in society, if possible, if not identified and can be identified were assumed to be 50% of the vocabulary of community a = Significance level is either 1% or 5% or 10% 421

4 Z = degree of confidence (the number of standard errors for the degree of confidence specified for the research) 1 a = Confidence coefficient By applying formula (1): n = 0.5*(1-0.5)/((0.5*(1-0.5)/970)+(0.52/1.962)) = 275 It is almost 28% of the size of the community. Validity and reliability of the research instrument were checked to assure the results of the study will be accurate. 3. Results and Discussion After analyzing the questionnaires results it showed that the awareness of the employees about WiMax was high as shown in Fig 1. MTN has the most employers who are familiar with WiMAX, it represents 100.0%, whereas 86.8% from Sabafon, 84.2% from Y company, and 93.9% from Yemen mobile. Fig. 1. Awareness of WiMax The cost of deploying WiMax was quite suitable for all companies. On the opposite, all companies almost agreed that the cost for customers will be expensive and not suitable. Fig. 2, showed the percentage of suitability for each company. Fig. 2. (a) Cost suitability for companies; (b) cost suitability for customers The study is quantitative; therefore, the analysis result represented a percent of readiness for each company to deploy WiMax in telecommunication companies. The readiness percentage for Sabafon was 54.4%, for MTN was 42.9%, for Y company was 36.1%, and for Yemen mobile was 44.0% as shown in fig

5 4. Conclusion Fig. 3. Readiness of telecommunications companies to deploy WiMax In this paper a questionnaire was used to collect necessary data to do an assessment of telecommunication companies' infrastructure readiness to deploy WiMax in Yemen. However, the telecommunication companies are not ready enough to implement WiMax for several reasons, such as they do not have a suitable infrastructure that support WiMax, and most of them need to upgrade to at least 3G network to deploy WiMax. Acknowledgements This work was partially supported by the Universiti Putra Malaysia, Research University Grant Scheme (RUGS Number: 05/03/10/1039RU) and by Alandalus University Yemen. References [1] Pareek, D. Front Matter, in The Business of WiMax, John Wiley & Sons, Ltd, Chichester, UK; [2] Ahson, S., Ilyas, M. WiMax Standards and security. Boca Raton; CRC Press, [3] Nichols, S. J. V. Achieving Wireless Broadband with WiMax, Computer 2004; 37: 6, [4] Sabafon profile, Retrieved from on October [5] MTN profile, Retrieved from on October [6] Y company, Retrieved from on October [7] Yemen mobile, Retrieved from on October [8] Bugshan, H. B., Sohail, M. S., WiMax system in Saudi Arabia: deployment issues and development of marketing strategy. Int. Journal of Business and Systems Research 2010; 4:2, [9] Jha, R. K. & Dalal, U. D., How WiMax will deploy in India. IJACSA - International Journal of Advanced Computer Science and Applications 2010; 1, [10] Ahuja, S. P., Collier, N. An Assessment of WiMax Security. Communications and Network 2010; 2:2,

VISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks

VISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks Rev.Confirming Pages VISUAL SUMMARY Communications and Networks COMMUNICATIONS COMMUNICATION CHANNELS Communications is the process of sharing data, programs, and information between two or more computers.

More information

Advanced Mobile Computing and Networking - CS 560. Wireless Technologies. Bluetooth. Bluetooth. Bluetooth. Bluetooth 7/3/2014.

Advanced Mobile Computing and Networking - CS 560. Wireless Technologies. Bluetooth. Bluetooth. Bluetooth. Bluetooth 7/3/2014. Advanced Mobile Computing and Networking - CS 560 Assessment CA 40% - Assignment 20% - 2 Tests 10% each Exam 60% Wireless Technologies, Infrared Data Association (),, and Institute of Electrical and Electronic

More information

4G Technology in contrast with other G Technologies Raja Solanki,Vineeet Godara, Prashant Solanki, Dhronacharya Engineering College,Gurgaon,India

4G Technology in contrast with other G Technologies Raja Solanki,Vineeet Godara, Prashant Solanki, Dhronacharya Engineering College,Gurgaon,India Technology in contrast with other G Technologies Raja Solanki,Vineeet Godara, Prashant Solanki, Dhronacharya Engineering College,Gurgaon,India Abstract-Wireless services have the highest demand in internet

More information

Communication Technologies

Communication Technologies Unit 29: Communication Technologies Unit code: F/601/7264 QCF Level 3: BTEC Specialist Credit value: 10 Guided learning hours: 60 Aim and purpose The aim of this unit is to ensure learners understand the

More information

Concepts, Technology, and Applications of Mobile Commerce

Concepts, Technology, and Applications of Mobile Commerce Concepts, Technology, and Applications of Mobile Commerce Robert Nickerson Professor and Chair Department of Information Systems Director, Center for Electronic Business College of Business San Francisco

More information

CHAPTER 5 Introduction to Internet Technology

CHAPTER 5 Introduction to Internet Technology COMPUTER LITERACY (FSPK0012) CHAPTER 5 Introduction to Internet Technology by: Dr. Siti Hajar Othman & Dr. Nazmona Mat Ali Faculty of Computing, UTM Johor Bharu Email: hajar@utm.my / nazmona@utm.my Phone:

More information

Appeal Decision. Appeal No USA ALCATEL-LUCENT USA LTD. Tokyo, Japan. Tokyo, Japan

Appeal Decision. Appeal No USA ALCATEL-LUCENT USA LTD. Tokyo, Japan. Tokyo, Japan Appeal Decision Appeal No. 2014-5131 USA Appellant ALCATEL-LUCENT USA LTD. Tokyo, Japan Patent Attorney OKABE, Yuzuru Tokyo, Japan Patent Attorney YOSHIZAWA, Hiroshi The case of appeal against the examiner's

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK MOBILE COMMUNICATION AMOL RATAN VAIDKAR 1, PROF. G. D. GULHANE 2, DR. H. R. DESHMUKH

More information

Wireless local loop. A Seminar report On

Wireless local loop.  A Seminar report On A Seminar report On Wireless local loop Submitted in partial fulfillment of the requirement for the award of degree Of Electronics SUBMITTED TO: SUBMITTED BY: www.studymafia.org www.studymafia.org Preface

More information

Twelfth Edition. Chapter 8: Wired and Wireless Communication. Copyright 2012 Pearson Education, Inc. Publishing as Prentice Hall 1

Twelfth Edition. Chapter 8: Wired and Wireless Communication. Copyright 2012 Pearson Education, Inc. Publishing as Prentice Hall 1 Computers Are Your Future Twelfth Edition Chapter 8: Wired and Wireless Communication Copyright 2012 Pearson Education, Inc. Publishing as Prentice Hall 1 Wired and Wireless Communication Copyright 2012

More information

THE WIRELESS ACCESSIBILITY WORKSHOP

THE WIRELESS ACCESSIBILITY WORKSHOP Fixed and mobile applications of WiMAX THE WIRELESS ACCESSIBILITY WORKSHOP at CTIA Monica Paolini Senza Fili Consulting Wednesday April 5, 2006 April 6, 2006-2 - Senza Fili Consulting LLC Senza Fili Consulting

More information

First-Time Usability Testing for Bluetooth-Enabled Devices

First-Time Usability Testing for Bluetooth-Enabled Devices The University of Kansas Technical Report First-Time Usability Testing for Bluetooth-Enabled Devices Jim Juola and Drew Voegele ITTC-FY2005-TR-35580-02 July 2004 Project Sponsor: Bluetooth Special Interest

More information

This tutorial has been designed to help beginners understand the basic concepts of WiMAX.

This tutorial has been designed to help beginners understand the basic concepts of WiMAX. About the Tutorial WiMAX is one of the hottest broadband wireless technologies around today. It is based on IEEE 802.16 specification and it is expected to deliver high quality broadband services. This

More information

OPNET BASED SIMULATION AND INVESTIGATION OF WIMAX NETWORK USING DIFFERENT QoS

OPNET BASED SIMULATION AND INVESTIGATION OF WIMAX NETWORK USING DIFFERENT QoS OPNET BASED SIMULATION AND INVESTIGATION OF WIMAX NETWORK USING DIFFERENT QoS Kamini Jaswal 1, Jyoti 2, Kuldeep Vats 3 1 M.tech, Department of electronics and communication, South point institute of engineering

More information

Mobile Telephony and Broadband services

Mobile Telephony and Broadband services Mobile Telephony and Broadband services A way to reduce the gap of digital divide in Mediterranean Marios Yiatzidis Regulatory Manager 02 05 2006 Table of Contents The growth of mobile communications Mobile

More information

GOPALAN COLLEGE OF ENGINEERING AND MANAGEMENT Electronics and communication Department

GOPALAN COLLEGE OF ENGINEERING AND MANAGEMENT Electronics and communication Department Appendix - F GOPALAN COLLEGE OF ENGINEERING AND MANAGEMENT Electronics and communication Department Academic Year: 2016-17 Semester: EVEN 6. COURSE PLAN Semester: VI Subject Code: 10EC81 Name of Subject:

More information

Agilent E7478A GPRS Drive Test System

Agilent E7478A GPRS Drive Test System Agilent E7478A GPRS Drive Test System Product Overview Quickly deploy your GPRS networks and manage multiformat environments Our drive test solution doesn t just uncover problems on your GPRS network it

More information

Multimedia Environment for Mobiles (MEMO) - Interactive Multimedia Services to Portable and Mobile Terminals

Multimedia Environment for Mobiles (MEMO) - Interactive Multimedia Services to Portable and Mobile Terminals Multimedia Environment for Mobiles (MEMO) - Interactive Multimedia Services to Portable and Mobile Terminals Thomas Lauterbach* and Matthias Unbehaun Robert Bosch Multimedia-Systems GmbH & Co. KG, P.O.

More information

Mobility+ Computing Deployment and Management. Course Outline. Mobility+ Computing Deployment and Management. 07 Apr

Mobility+ Computing Deployment and Management. Course Outline. Mobility+ Computing Deployment and Management. 07 Apr Course Outline Mobility+ Computing Deployment and Management 07 Apr 2019 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

Lecture - 01 Evolution of Wireless Communication Technologies

Lecture - 01 Evolution of Wireless Communication Technologies Principles of Modern CDMA/MIMO/OFDM Wireless Communications Prof. Aditya K. Jagannatham Department of Electrical Engineering Indian Institute of Technology, Kanpur Lecture - 01 Evolution of Wireless Communication

More information

Creating New Investment Opportunities: The First CDMA 450 EV-DO Network

Creating New Investment Opportunities: The First CDMA 450 EV-DO Network Creating New Investment Opportunities: The First CDMA 450 EV-DO Network Eduard Eck Technical Strategy Manager Eurotel Praha, s.r.o. eduard_eck@eurotel.cz All rights reserved. 12/21/2005 1 The Case for

More information

The WiMAX Technology

The WiMAX Technology Page 2 Oeconomics of Knowledge, Volume 2, Issue 2, 2Q 2010 The WiMAX Technology Felician ALECU, PhD, University Lecturer Department of Economic Informatics Academy of Economic Studies, Bucharest, Romania

More information

State of Cloud Survey GERMANY FINDINGS

State of Cloud Survey GERMANY FINDINGS 2011 State of Cloud Survey GERMANY FINDINGS CONTENTS Executive Summary... 4 Methodology... 6 Finding 1: Cloud security is top goal and top concern.................................. 8 Finding 2: IT staff

More information

Security Survey Executive Summary October 2008

Security Survey Executive Summary October 2008 A government technology Executive Survey Summary: HP Security Survey Executive Summary October 2008 Produced by: In Partnership With: Introduction Information is paramount to the survival of government

More information

Results of Telecommunications Usage Trend Survey 2007

Results of Telecommunications Usage Trend Survey 2007 International Affairs Department, Telecommunications Bureau Vol. 19 No. 1 Biweekly Newsletter of the Ministry of Internal Affairs and Communications (MIC), Japan ISSN 1349-7987 Please feel free to use

More information

It is the process of sharing data, programs, and information between two or more computers.

It is the process of sharing data, programs, and information between two or more computers. 1 Communications It is the process of sharing data, programs, and information between two or more computers. Numerous applications depend on communication systems: E-mail Instant messaging (IM) Internet

More information

09. Mobile Commerce. Contents. Mobile Computing and Commerce

09. Mobile Commerce. Contents. Mobile Computing and Commerce 09. (Contents) Mobile Commerce Contents 09. Mobile Commerce Mobile Computing and Commerce Code: 166140-01+02 Course: Electronic Commerce Period: Autumn 2011 Professor: Sangwon Lee, Ph.D. 1 09. (Contents)

More information

Unit title: Mobile Technology: Device Connectivity (SCQF level 5) Outcome 1

Unit title: Mobile Technology: Device Connectivity (SCQF level 5) Outcome 1 1 Outcome 1 A description of mobile device internet connectivity using two current Wi-Fi methods. A description of mobile device internet connectivity using two current GSM mobile telephony methods. A

More information

To Study the Usage & Awareness of M- Commerce and its services with reference to Nagpur City

To Study the Usage & Awareness of M- Commerce and its services with reference to Nagpur City To Study the Usage & Awareness of M- Commerce and its services with reference to Nagpur City Prof. Prerna Thakwani Assistant Professor, Dept. of MBA, Tirpude Institute of Management Education, Nagpur,

More information

Mobile Systems Challenges in Next Generation Networks

Mobile Systems Challenges in Next Generation Networks International Journal of Future Generation Communication and Networking 15 Mobile Systems Challenges in Next Generation Networks Seyed Ali Alavian, Jahangir Dadkhah Chimeh Faculty of Applied Science of

More information

OPNET based Performance Evaluation of WIMAX Network with WIMAX Management using Different QoS

OPNET based Performance Evaluation of WIMAX Network with WIMAX Management using Different QoS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.862

More information

Computer networks for the home

Computer networks for the home Technical paper Computer networks for the home Computer networks for the home An overview This paper gives information about current and emerging technologies for networking computers in the home. It is

More information

COURSE OUTLINE. School of Engineering Technology and Applied Science. Computer Systems & Network Technology/ Technician

COURSE OUTLINE. School of Engineering Technology and Applied Science. Computer Systems & Network Technology/ Technician COURSE OUTLINE SCHOOL: School of Engineering Technology and Applied Science DEPARTMENT: Information and Communication Engineering Technology (ICET) PROGRAM: Computer Systems & Network Technology/ Technician

More information

Trust Harris for LTE. Critical Conditions Require Critical Response

Trust Harris for LTE. Critical Conditions Require Critical Response Trust Harris for LTE Critical Conditions Require Critical Response Harris LTE Solution Harris LTE Solution Harris LTE Networks Critical Conditions Require Critical Response. Trust Harris for LTE. Public

More information

A STUDY OF CUSTOMER DEFECTION IN CELLULAR SERVICES IN INDIA

A STUDY OF CUSTOMER DEFECTION IN CELLULAR SERVICES IN INDIA A STUDY OF CUSTOMER DEFECTION IN CELLULAR SERVICES IN INDIA H.K.PRASAD Dr RECHANNA Research Scholar, JSSRF, University of Mysore, Mysuru. Associate Professor in Commerce, JSS College for Women, Saraswathipuram,

More information

THE CYBERSECURITY LITERACY CONFIDENCE GAP

THE CYBERSECURITY LITERACY CONFIDENCE GAP CONFIDENCE: SECURED WHITE PAPER THE CYBERSECURITY LITERACY CONFIDENCE GAP ADVANCED THREAT PROTECTION, SECURITY AND COMPLIANCE Despite the fact that most organizations are more aware of cybersecurity risks

More information

COUNTY OF EL DORADO, CALIFORNIA BOARD OF SUPERVISORS POLICY

COUNTY OF EL DORADO, CALIFORNIA BOARD OF SUPERVISORS POLICY PURPOSE: Page 1 of 8 This policy is intended to provide uniform and consistent standards for the application of cellular telephones, including devices often referred to as Smartphones (PDA s), to County

More information

16/06/56. Communications and Networks. Communications and Networks. Communications and Networks

16/06/56. Communications and Networks. Communications and Networks. Communications and Networks Discuss connectivity, the wireless revolution, and communication systems. Describe physical and wireless communications channels. Discuss connection devices and services, including dial-up, DSL, cable,

More information

Fundamentals of Information Systems, Seventh Edition

Fundamentals of Information Systems, Seventh Edition Fundamentals of Information Systems, Seventh Edition Chapter 4 Telecommunications, the Internet, Intranets, and Extranets Fundamentals of Information Systems, Seventh Edition 1 An Overview of Telecommunications

More information

Introducing Unified Critical Communications

Introducing Unified Critical Communications Introducing Unified Critical Communications for Public Safety EXECUTIVE SUMMARY Public safety agencies already use a range of wireless communications networks, including Land Mobile Radio (LMR), public

More information

An Overview of Wireless Networks

An Overview of Wireless Networks An Overview of Wireless Networks Matthew N. Anyanwu and Houssain Kettani Department of Computer Science Jackson State University Jackson MS 39217 matthew.n.anyanwu@jsums.edu houssain.kettani@jsums.edu

More information

ITU Regional ICT Indicators Workshop for Africa. IDI 2018 Access Sub-index and indicators

ITU Regional ICT Indicators Workshop for Africa. IDI 2018 Access Sub-index and indicators ITU Regional ICT Indicators Workshop for Africa Lilongwe, Malawi 20 21 March 2018 IDI 2018 Access Sub-index and indicators ICT Data and Statistics Division Telecommunication Development Bureau International

More information

CEN 538 Wireless LAN & MAN Networks

CEN 538 Wireless LAN & MAN Networks King Saud University College of Computer and Information Sciences Department of Computer Engineering CEN 538 Wireless LAN & MAN Networks Dr. Ridha OUNI rouni@ksu.edu.sa LMS web site References Text book

More information

COMPLETE SOLUTIONS SERVED ON A PLATE.

COMPLETE SOLUTIONS SERVED ON A PLATE. COMPLETE SOLUTIONS SERVED ON A PLATE. S E R V I C E S A V A I L A B L E APPLICATION DEVELOPMENT We can assist you with mobile apps, e- commerce, & bespoke applications. EDUCATIONAL SOLUTIONS Full turn-key

More information

SERVICE DISCOVERY IN MOBILE PEER-TO-PEER ENVIRONMENT

SERVICE DISCOVERY IN MOBILE PEER-TO-PEER ENVIRONMENT SERVICE DISCOVERY IN MOBILE PEER-TO-PEER ENVIRONMENT Arto Hämäläinen Lappeenranta University of Technology P.O. Box 20, 53851 Lappeenranta, Finland arto.hamalainen@lut.fi Jari Porras Lappeenranta University

More information

The Value of Cisco Compatible Extensions (CCX) for Mobile Computers

The Value of Cisco Compatible Extensions (CCX) for Mobile Computers The Value of Cisco Compatible Extensions (CCX) for Mobile Computers Originally Published: October 2007 Updated: April 2010, October 2012 A White Paper from Laird Technologies IEEE and industry standards

More information

Communications and Networks

Communications and Networks Information Technology Skills (DUT 122) CHAPTER 6: Communications and Networks Miss Wan Nor Ashiqin Wan Ali School of Human Development and Technocommunication Objectives Overview Discuss the purpose of

More information

What is wimax How is it different from GSM or others WiMAX setup Wimax Parameters-ranges BW etc Applns Where is it Deployed Who is the operator

What is wimax How is it different from GSM or others WiMAX setup Wimax Parameters-ranges BW etc Applns Where is it Deployed Who is the operator What is wimax How is it different from GSM or others WiMAX setup Wimax Parameters-ranges BW etc Applns Where is it Deployed Who is the operator Introduction- What is WiMAX WiMAX -Worldwide Interoperability

More information

Interference in Femtocell Networks. Roger Piqueras Jover ELEN E6951 Wireless & Mobile Networking II April 13th 2009

Interference in Femtocell Networks. Roger Piqueras Jover ELEN E6951 Wireless & Mobile Networking II April 13th 2009 Interference in Femtocell Networks Roger Piqueras Jover ELEN E6951 Wireless & Mobile Networking II April 13th 2009 Overview Wireless cellular networks Current challenges in cellular networks Femtocell

More information

The ResiStand Project

The ResiStand Project INCREASING DISASTER RESILIENCE BY ESTABLISHING A SUSTAINABLE PROCESS TO SUPPORT STANDARDISATION OF TECHNOLOGIES AND SERVICES The ResiStand Project IMPROVER / ERNCIP 2 nd Joint Operators Workshop 11-12

More information

ISSN: (Online) Volume 4, Issue 1, January 2016 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 4, Issue 1, January 2016 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 4, Issue 1, January 2016 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Mobile Commerce. Electronic Commerce

Mobile Commerce. Electronic Commerce Mobile Commerce Electronic Commerce Code: 008023-01+02 Course: Electronic Commerce Period: Autumn 2013 Professor: Sync Sangwon Lee, Ph. D D. of Information & Electronic Commerce 1 00. Contents 01. Mobile

More information

Securing the Empowered Branch with Cisco Network Admission Control. September 2007

Securing the Empowered Branch with Cisco Network Admission Control. September 2007 Securing the Empowered Branch with Cisco Network Admission Control September 2007 Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. 1 Contents 1 The Cisco Empowered Branch 2 Security Considerations

More information

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students

More information

PROPOSAL THESIS RESEACH IP MULTIMEDIA PACKET DELAY AND TRAFFIC ANALYSIS

PROPOSAL THESIS RESEACH IP MULTIMEDIA PACKET DELAY AND TRAFFIC ANALYSIS PROPOSAL THESIS RESEACH IP MULTIMEDIA PACKET DELAY AND TRAFFIC ANALYSIS Author DHANNY PERMATASARI PUTRI 55412110012 MAGISTER TELECOMMUNICATION PROGRAMME ELECTRO DEPARTEMENT UNIVERSITAS MERCU BUANA JAKARTA

More information

Performance Analysis for Channel Utilization in Wireless LAN

Performance Analysis for Channel Utilization in Wireless LAN Performance Analysis for Channel Utilization in Wireless LAN Shweta Singh Naresh Chandra Arun Kumar Tripathi ABSTRACT Wireless network plays an important role in field of communication. Now a days people

More information

AUTOMATED FAULT AND DISTURBANCE DATA ANALYSIS. Special Report for PS#2. Special Reporter: Mladen Kezunovic * U.S.A.

AUTOMATED FAULT AND DISTURBANCE DATA ANALYSIS. Special Report for PS#2. Special Reporter: Mladen Kezunovic * U.S.A. AUTOMATED FAULT AND DISTURBANCE DATA ANALYSIS Special Report for PS#2 Special Reporter: Mladen Kezunovic * U.S.A. This paper gives a set of questions stimulated by twenty one papers submitted by the authors

More information

VIRTUAL PRIVATE NETWORKS (VPN)

VIRTUAL PRIVATE NETWORKS (VPN) VIRTUAL PRIVATE NETWORKS (VPN) Cisco on Cisco E-Learning Series - Executive Track TRANSCRIPT INTRODUCTION Helping employees work productively anytime, anywhere is a necessity in many organizations. Offering

More information

WIRELESS DEVICES: ACCEPTABLE USE AND GUIDELINES

WIRELESS DEVICES: ACCEPTABLE USE AND GUIDELINES Goodhue County Education District #6051 WIRELESS DEVICES: ACCEPTABLE USE AND GUIDELINES Procedures Manual Updated January 2016 Table of Contents Overview 3 Definitions 3 General Guidelines 4 Eligibility

More information

Performance Comparison of WiMAX and WLAN Technologies using OPNET Modeler

Performance Comparison of WiMAX and WLAN Technologies using OPNET Modeler International Conference on Engineering Research & Applications (ICERA) İstanbul (Turkey) May.17-1, 2017 Performance Comparison of WiMAX and WLAN Technologies using OPNET Modeler Ali GEZER 1, Marwa Khaleel

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 12 Wireless Communications in Business Objectives List the advantages of wireless communications for businesses Discuss the challenges of wireless communications

More information

Glossary 1. ARPU or Average Revenue per User A method of measuring revenue associated with the delivery of mobile commerce services by MNOs.

Glossary 1. ARPU or Average Revenue per User A method of measuring revenue associated with the delivery of mobile commerce services by MNOs. Glossary 321 Glossary 1 2G or 2nd Generation The currently available digital communication networks for voice and data communication (e.g., GSM, CDMA, PDC). 2.5G or 2.5th Generation Represents an upgrade

More information

On A Traffic Control Problem Using Cut-Set of Graph

On A Traffic Control Problem Using Cut-Set of Graph 1240 On A Traffic Control Problem Using Cut-Set of Graph Niky Baruah Department of Mathematics, Dibrugarh University, Dibrugarh : 786004, Assam, India E-mail : niky_baruah@yahoo.com Arun Kumar Baruah Department

More information

EKT 450 Mobile Communication System

EKT 450 Mobile Communication System EKT 450 Mobile Communication System Chapter 1: Introduction to Mobile Communication System Prof Dr. Sabira Khatun, Dr. Muzammil Jusoh, Dr. Norsuhaida Ahmad School of Computer and Communication Engineering

More information

Performance Evaluation of Wi-Fi Release (IEEE A, B, G and N) Using OPNET

Performance Evaluation of Wi-Fi Release (IEEE A, B, G and N) Using OPNET Performance Evaluation of Wi-Fi Release (IEEE 802.11 A, B, G and N) Using OPNET Amel Aboud Ali 1 and Dr. Amin Babiker A/Nabi Mustafa 2 1 Faculty of Engineering, Neelain University, Khartoum, Sudan malamel@live.com

More information

Purpose of this book. Chapter 1: Where to Begin

Purpose of this book. Chapter 1: Where to Begin 1 Where to Begin This book was created by a team of individuals who each, in their own field, are actively participating in the ever-expanding Internet by pushing its reach farther than ever before. The

More information

Contents. Enterprise Solution 04. Why Samsung? 05 WLAN 06. Voice Solution 08. Mobile Unified Communications 09. Enterprise Security 10

Contents. Enterprise Solution 04. Why Samsung? 05 WLAN 06. Voice Solution 08. Mobile Unified Communications 09. Enterprise Security 10 Contents Enterprise Solution 04 Why Samsung? 05 WLAN 06 Voice Solution 08 Mobile Unified Communications 09 Enterprise Security 10 3 Enterprise Solution Why Samsung? Mobile devices are increasingly at the

More information

COMPUTER SKILLS COMP101

COMPUTER SKILLS COMP101 COMPUTER SKILLS COMP101 Chapter 4 Introduction to Computer Networks Definitions and Terminologies Computer Network A network consists of two or more computers that are linked in order to share resources

More information

DATA SHEET HIGHTLIGHTS Deploying a Single System to Manage All Devices and Services Implementing Service Assurance

DATA SHEET HIGHTLIGHTS Deploying a Single System to Manage All Devices and Services Implementing Service Assurance Motorola EDGE Service Assurance Software Suite The allows service providers to expand broadband service revenues while reducing operational and support costs through automated service provisioning and

More information

Wireless Backhaul Synchronization

Wireless Backhaul Synchronization Wireless Backhaul Synchronization Abstract This paper focuses on Next Generation Backhaul Networks Synchronization and the way it is implemented by Ceragon s high capacity, LTE Ready point to point microwave

More information

Consumer Opinions and Habits A XIRRUS STUDY

Consumer Opinions and Habits A XIRRUS STUDY Consumer Opinions and Habits A XIRRUS STUDY Executive Summary With more devices on the planet than people, it goes without saying that wireless is no longer a bonus - it s a necessity. By the end of 2015,

More information

LTE : The Future of Mobile Broadband Technology

LTE : The Future of Mobile Broadband Technology LTE : The Future of Mobile Broadband Technology Erick Setiawan tukangbajaksawah@gmail.com 1 Become a necessity today, where the wireless broadband technology needed to meet increasing expectations in terms

More information

TELECOM & ENERGY «Collaborating to Power the Smart Grids for Digital Growth«

TELECOM & ENERGY «Collaborating to Power the Smart Grids for Digital Growth« REPUBLIC OF ALBANIA ELECTRONIC AND POSTAL COMMUNICATIONS AUTHORITY - AKEP TELECOM & ENERGY «Collaborating to Power the Smart Grids for Digital Growth« SUMMARY What is Smart Grid Communications Networks

More information

77% 56% 74% 52% PACKAGING WORLD SURVEY: Ethernet And Wireless In Production Facilities

77% 56% 74% 52% PACKAGING WORLD SURVEY: Ethernet And Wireless In Production Facilities Ethernet Usage + Strategy Survey 2012 A joint survey by Packaging World and XYZ Company was conducted in late 2012 to obtain insight into current engineering and management applications and opinions surrounding

More information

WiMAX Capacity Enhancement: Capacity Improvement of WiMAX Networks by Dynamic Allocation of Subframes

WiMAX Capacity Enhancement: Capacity Improvement of WiMAX Networks by Dynamic Allocation of Subframes WiMAX Capacity Enhancement: Capacity Improvement of WiMAX Networks by Dynamic Allocation of Subframes Syed R. Zaidi, Shahab Hussain, M. A. Ali Department of Electrical Engineering The City College of The

More information

SMART GRID INDUSTRY SURVEY

SMART GRID INDUSTRY SURVEY SMART GRID INDUSTRY SURVEY COMMUNICATIONS AND NETWORK MANAGEMENT FOR ELECTRIC UTILITY SMART GRID DEPLOYMENTS Prepared by 1 Survey Methodology This Smart Grid Industry Survey is the first of a two-part

More information

Automation, DevOps, and the Demands of a Multicloud World in the Telecommunications Industry

Automation, DevOps, and the Demands of a Multicloud World in the Telecommunications Industry Automation, DevOps, and the Demands of a Multicloud World in the Telecommunications Industry An IDC InfoBrief, Sponsored by Red Hat March 2018 Sponsored by Red Hat Page 1 Methodology In September, 2017

More information

COURSE OUTLINE. School of Engineering Technology and Applied Science. Electronics Engineering Technology/ Technician. Wireless Networks & Applications

COURSE OUTLINE. School of Engineering Technology and Applied Science. Electronics Engineering Technology/ Technician. Wireless Networks & Applications COURSE OUTLINE SCHOOL: School of Engineering Technology and Applied Science DEPARTMENT: Information and Communication Engineering Technology (ICET) PROGRAM: Electronics Engineering Technology/ Technician

More information

National Information Assurance (IA) Policy on Wireless Capabilities

National Information Assurance (IA) Policy on Wireless Capabilities Committee on National Security Systems CNSS Policy No. 17 National Information Assurance (IA) Policy on Wireless Capabilities This document prescribes minimum standards. Your department or agency may require

More information

Supply Chain Integrity and Security Assurance for ICT. Mats Nilsson

Supply Chain Integrity and Security Assurance for ICT. Mats Nilsson Supply Chain Integrity and Security Assurance for ICT Mats Nilsson The starting point 2 B Internet users 85% Population coverage 5+ B Mobile subscriptions 10 years of Daily upload E-Books surpassing Print

More information

A Proposed Framework for Testing Mobile Cloud Based Applications Using Mobile Testing as a Service (MTaaS)

A Proposed Framework for Testing Mobile Cloud Based Applications Using Mobile Testing as a Service (MTaaS) A Proposed Framework for Mobile Cloud Based Applications Using Mobile as a Service (MTaaS) Engr. Ali Ahmed Computer & Software Engineering Department Bahria University, Karachi Campus Karachi, Pakistan

More information

Modernizing the Grid for a Low-Carbon Future. Dr. Bryan Hannegan Associate Laboratory Director

Modernizing the Grid for a Low-Carbon Future. Dr. Bryan Hannegan Associate Laboratory Director Modernizing the Grid for a Low-Carbon Future Dr. Bryan Hannegan Associate Laboratory Director Aspen Energy Policy Forum July 5, 2016 40 YEARS OF CLEAN ENERGY RESEARCH Founded as Solar Energy Research Institute

More information

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6

More information

Discovering Computers Chapter 9 Communications and Networks

Discovering Computers Chapter 9 Communications and Networks Discovering Computers 2009 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the components required for successful communications Identify various sending and receiving devices Describe

More information

Sujesh P. Lal VIT University, TN, INDIA

Sujesh P. Lal VIT University, TN, INDIA VoIP TRAFFIC SCHEDULING IN Sujesh P. Lal VIT University, TN, INDIA Introduction Popularity of Voice over IP (VoIP) applications such as Skype, Google Talk, and MSN Messenger along with emerging deployment

More information

Chapter - 1 INTRODUCTION

Chapter - 1 INTRODUCTION Chapter - 1 INTRODUCTION Worldwide Interoperability for Microwave Access (WiMAX) is based on IEEE 802.16 standard. This standard specifies the air interface of fixed Broadband Wireless Access (BWA) system

More information

COPYRIGHTED MATERIAL. Introduction. 1.1 Introduction

COPYRIGHTED MATERIAL. Introduction. 1.1 Introduction 1 Introduction 1.1 Introduction One of the most fascinating characteristics of humans is their capability to communicate ideas by means of speech. This capability is undoubtedly one of the facts that has

More information

X-Kryptor Secures all Networks

X-Kryptor Secures all Networks Features Secure wired and wireless networks Protects data in transit Supports home and mobile working Compatible with xdsl, Wi-Fi and 3G Prevents unauthorised access to your network Scalable for small

More information

DO YOU UTILIZE WIRELESS TECHNOLOGY?

DO YOU UTILIZE WIRELESS TECHNOLOGY? DO YOU UTILIZE WIRELESS TECHNOLOGY? January 2015 http:///publications/studies/survey_wireless.html Survey Details Topic: Utilization of wireless technologies among German companies Timeframe: Sep 15, 2014

More information

AVAILABILITY OF ADVANCED TELECOMMUNICATIONS CAPABILITY IN PUBLIC BODIES YEAR 2008 REPORT. Economic Research and Financial Analysis Division

AVAILABILITY OF ADVANCED TELECOMMUNICATIONS CAPABILITY IN PUBLIC BODIES YEAR 2008 REPORT. Economic Research and Financial Analysis Division AVAILABILITY OF ADVANCED TELECOMMUNICATIONS CAPABILITY IN PUBLIC BODIES YEAR 2008 REPORT Economic Research and Financial Analysis Division Public Utility Commission of Oregon November 2008 Page 1 Availability

More information

Safety Perception Survey s: Interviewing & Sampling Method Considerations

Safety Perception Survey s: Interviewing & Sampling Method Considerations Safety Perception Survey s: Interviewing & Sampling Interviewing Methods Each method has advantages and disadvantages. Personal Interviews An interview is called personal when the interviewer asks the

More information

Strategy for information security in Sweden

Strategy for information security in Sweden Strategy for information security in Sweden 2010 2015 STRATEGY FOR SOCIETAL INFORMATION SECURITY 2010 2015 1 Foreword In today s information society, we process, store, communicate and duplicate information

More information

Internet Exchange Points An Internet Society Public Policy Briefing

Internet Exchange Points An Internet Society Public Policy Briefing Internet Exchange Points An Internet Society Public Policy Briefing 30 October 2015 Introduction Internet exchange points are physical locations where different networks connect to exchange Internet traffic

More information

INFORMATION SECURITY MANAGEMENT SYSTEMS CERTIFICATION RESEARCH IN THE ROMANIAN ORGANIZATIONS

INFORMATION SECURITY MANAGEMENT SYSTEMS CERTIFICATION RESEARCH IN THE ROMANIAN ORGANIZATIONS U.P.B. Sci. Bull., Series D, Vol. 77, Iss. 4, 2015 ISSN 1454-2358 INFORMATION SECURITY MANAGEMENT SYSTEMS CERTIFICATION RESEARCH IN THE ROMANIAN ORGANIZATIONS Bogdan ŢIGĂNOAIA 1, Anca-Alexandra PURCĂREA

More information

Cisco Digital Media System: Simply Compelling Communications

Cisco Digital Media System: Simply Compelling Communications Cisco Digital Media System: Simply Compelling Communications Executive Summary The Cisco Digital Media System enables organizations to use high-quality digital media to easily connect customers, employees,

More information

Driving Global Resilience

Driving Global Resilience Driving Global Resilience Steve Mellish FBCI Chairman, The Business Continuity Institute Monday December 2nd, 2013 Business & IT Resilience Summit New Delhi, India Chairman of the Business Continuity Institute

More information

The Australian Network of Structural Health Monitoring 8th Annual Workshop. Invitation & Call for Abstracts

The Australian Network of Structural Health Monitoring 8th Annual Workshop. Invitation & Call for Abstracts The Australian Network of Structural Health Monitoring 8th Annual Workshop 29 30 Nov 2016 (Tuesday and Wednesday), Melbourne Organizers: Dr. Colin Caprani and Dr. Ye Lu, Department of Civil Engineering,

More information

TOPIC 5: COMMUNICATION AND INTERNET

TOPIC 5: COMMUNICATION AND INTERNET TOPIC 5: COMMUNICATION AND INTERNET MOHD YUNUS SHARUM (DR.) NORIDAYU MANSHOR (DR.) Faculty of Computer Science and Information Technology Universiti Putra Malaysia Communication and Internet Describe about

More information

Wireless Technology Update

Wireless Technology Update Cellular Communications 802.11n 802.11y Summary Q&A AGENDA Tony Whaley, RCDD/NTS/WD/CWP, CTS RTKL Associates, Baltimore, Maryland Cellular Communications Update 4G 4G is short for fourth-generation. The

More information

Mobile Banking ~ Smart & Secure

Mobile Banking ~ Smart & Secure WHITEPAPER Mobile Banking ~ Smart & Secure This whitepaper is an extract from: Mobile Banking Handset & Tablet Market Strategies 2013-2017... information you can do business with Mobile Banking ~ Smart

More information