Wireless Evolution •..••••.•.•...•....•.•..•.•••••••...••••••.•••.••••••.••.•.••.••••••• 4

Total Page:16

File Type:pdf, Size:1020Kb

Wireless Evolution •..••••.•.•...•....•.•..•.•••••••...••••••.•••.••••••.••.•.••.••••••• 4 Department of Justice ,"'''''''''<11 Bureau of Investigation ,Operational Technology Division WIRELESS EVDLUTIDN IN THIS Iselil-it:: .. WIRELESS EVOLUTIDN I!I TECH BYTES • LONG TERM EVOLUTIQN ill CLDUD SERVICES • 4G TECHNOLOGY ill GESTURE-RECOGNITION • FCC ON BROADBAND • ACTIVITY-BASED NAVIGATION 'aw PUIi! I' -. q f. 8tH'-.1 Waa 8RI,. (!.EIi/RiW81 R.d-nl)) - 11 - I! .el " Ij MESSAGE FROM MANAGEMENT b7E he bou~~aries of technology are constantly expanding. develop technical tools to combat threats along the Southwest Recognizing the pathway of emerging technology is Border. a key element to maintaining relevance in a rapidly changing technological environment. While this The customer-centric approach calls for a high degree of T collaboration among engineers, subject matter experts (SMEs), proficiency is fundamentally important in developing strategies that preserve long-term capabilities in the face of emerging and the investigator to determine needs and requirements. technologies, equally important is delivering technical solutions To encourage innovation, the technologists gain a better to meet the operational needs of the law enforcement understanding of the operational and investigative needs customer in a dynamic 'threat' environment. How can technical and tailor the technology to fit the end user's challenges. law enforcement organizations maintain the steady-state Rather than developing solutions from scratch, the customer­ production of tools and expertise for technical collection, while centric approach leverages and modifies the technoloe:v to infusing ideas and agility into our organizations to improve our fit the customer's nFlFlrt~.1 ability to deliver timely, relevant, and cutting edge tools to law enforcement customers? Balancing these two fundamentals through an effective business strategy is both a challenge and an opportunity for the Federal Bureau of Investigation (FBI) and other Federal, state, and local law enforcement agencies. Organizations that have traditionally been successful in vertical This ~dition .of th~ Emerging Technr.::0.:,;:lo.li:i:;::;es:....:.:=:::.:.:::::.:....J.=.!!.!L., lines of production (sometimes referred to as stovepipes) can also benefit from an injection of this type of horizontal "internal consultancy" to jumpstart their capabilities. One L-_______...Jln the last decade, smartphone technology and the ability to communicate data over handheld way to implement this customer-centric business strategy and other portable devices have grown exponentially. Simple is to empower a team of engineers and SMEs with the Personal Digital Assistants (PDAs) have been replaced with latitude to work across multiple departments, selecting those the iPhone, Android, and other Global Positionin System technologies that best fit the customer's needs. By setting (GPS) enabled hybrid devices. the customer's requirements as the end goal, the internal and external collaboration is driven by the user's requirements. The unique tool or capability derived from this process is the product of the collaboration. As law enforcement moves forward into the 21st century, emerging technologies such ~.IoW.L"""'liiLLLL.W~.I.II.II.LJJ..LIOJ.-'I1.IiLol, When we consider strategies to mitigate risks posed by other wireless tech nolo ies a......::-:-_~_~_~ ______.....IThe concepts of innovation and collaboration focused on the customer's requirements are not limited to technology. These principles rm..;a.:..y_b;;.;e_a;;....;;.s.;;.;ou:.;;n;.;;;d...;:·s:.::tr;.;;;at.::e;su...:.::.:.~:a..:;::::.:.:.:...:::.:~~.:.:.:::.:!IL_---J can help deliver relevant technical solutions successfully, especially when the technology is changing at such a rapid pace. We can count on technology to change. Our strategy for L-________.JAs an alternative, consider the dealing with this change can make a difference in the technical opportunity to employ a customer-centric business strategy tools we provide our Federal, state, and local law enforcement that combines technology, innovation, and collaboration. This customers. strategy was recently incorporated into the FBI's efforts to ~=======--------~~--.---.. _.- 1. Message From, Management . • . • • . • . • . • • • • • • • • • . • • • • • . • • • • • • • • • • • • • • • . • • • • • • • • • • • • • •• I 2. The FCC's Net Neutrality Rules (CIU) •••..•••.••••.•.••••...••••..•.•.•..••••••.•••••.....•. 2 3. Wireless Evolution •..••••.•.•...•....•.•..•.•••••••...••••••.•••.••••••.••.•.••.••••••• 4. 4. !,:ong Term Evolution .................................................................... ~':I: 5. 4G: Technology. ••.•.••....•... '..•..•. " ..••..• '. • • . • . • • . • . • • • • • . • • • • . • . • • . • . • • • • • • •• 26 6. WI.reless. Cell PhQnQ< TQQhnQlog,es: A; ShQrHuJQrlC!1.. .•••• " •.••...••...... " . .•••••.•....•••••• 30 7. Opera.tQt'~ l;>i1em.m~1 femtQcelt or'WHW' •••....•.•..•.••.••..•• , •••. , ••• , •.••••.••••••.•.•• 3~ 8. fCC's, P.Qsltion: Qn: SJQij,<1.Q.iYJd.l Whit~ SRC!~Q-.... " • ", •• " ........... , .... '. " ..................... 3'4l 9~ elou~ Ser.v.iQ~s.......... " ...... " .•• , ...................... '.• ' ., •.• , •••••••••.•••• " •.• , •. , .•. 3QJ tQ~ Wlreg;v.s. Wl.reles$, ••••••••.••••.•• " ••••.....•... " •.... '.••• , , ......••. " , •.••..... , . , •• , 4? U. Qri<1~jn~:th~H~.~p., Wi-,lii, HQ.t$p-qts; .• " ................................................. " • , ... 4:~ ~2.'. Fr.Qffl; Wl-f.1 tc)'. MiF,i, '.' ~ ••••.•••..• '.....•.••.•..••. " . " ..••...•••.....•..•.......•••••.•. 49; t3'. $lu,Fp. l;>i~itaL ~y'edrgeP'er ..••••..•.....••.••.•.• , •• , ••.••..•••••••••••.•.••.•.••••.•.••• 5(:)' :1.:41., Hu.ma,l)) 1;)Q.t.§: Trantm!~~iqo~. • ............ , • • • • . • . • • • • . .. • • • • . .•••• , . • • • . • . • • s~ t;S •. G-e$tu.re.,r.e<;:qg,nitiQI1l ..•..•..•.•..... '. , ...•.•••..•.••...•••..•......••••...•.••.•.••••. ~6J :!i.Q. Mlcr;QsQfi WIJfler • '.••.•• , ••.••••.••.•...•..•.•..•.••.. , ................................ ~9: 1;1. CQu.nt~r.t~it ~a(lgQts.. • . • . • • • • . ............................................. , ...•••.•• 6Q~ ~S'. A.<;:tiv.itY-basec;t; Naxig,atiQI1: '....... " ......... , ............................................. 9~ t9~ Tech· Sytes •.••.•. '................ " ............................ , . " ••.•••• , ................. 6Q. ~Q:. Patents; Qf.lnterest ••••••.•• " ••...••..••••. , ..•.....•••......••.•..•....•••.••........• 6~. 2:1;. GIQssar.y ••••••••.•.•...•••• , •••••••.•. , ...•.•..• , •.••.••..•••..••••.••••.••••..••.•• 69. ~2·. Teclt Insights ...............................' ..•.••...•••.•.•••.•.••.•..•••.•..•.. , •.. • 12 6Qing Dark - A Rev.iew. QUhe NatiQnal' ~awful Int~rcept Strategy. ..................................... 7.3, 23. FYI' ..•.••••••••••••••••••••....•••••.••...•••• , .....•.•••.••.••...•...••..•.•••••. 76 While this document is believed to contain correct information, neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, expressed or Implied, or assumes legal responsibility for the accuracy, completeness, Dr usefulness of any information, apparatus. product, service, or process disclosed or represents that its use would not infringe privately owned rights. Reference herein to any speCific commercial product, process, or service by its trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government or any agency thereof. This document contains privileged, deliberative, sensitive information which relates to the.electronic surveillance procedures and capabilities, of law enforcement and other government agencies as well as their state of knowledge relating to such issues. The public or unauthorized and inappropriate disclosure of this document/information will, in fact facilitate the circumvention of the law. Circulation of this document, either physically or electronically is controlled and reserved exclusively to the FBI. Recipients of this document from the FBI may not publish, circulate or re-disclose this document or any information contained herein to any other person outside their agency without the express prior, written consent of the FBI. The only authorized methods of disposal are shredding or burning. -' ! am En" iii Ail , ' ! ¥ II P Ifllalsl Yes 8::1, (1!iS,'j;QIIQ) Rallillluu 'etl:stiaad b; JlI = I; i 2. THE FCC'S NET NEUTRALITY RULES I EXECUTIVE SUMMARY than fixed broadband. However, the FCC's rules prohibit On December 21, 2010, the Federal Communications mobile broadband providers from blocking lawful websites Commission (FCC) approved new rules aimed at regulating and applications that compete with their voice and video how broadband service providers offer ifldividuals and telephony services. organizations the ability to access the Internet. The Transparency FCC's goal was to, "... provide greater clarity and certainty A key purpose of the FCC's transparency rule is to enable regarding the continued freedom and openness of the third-party experts (e.g., independent engineers and Internet." In doing so, it adopted four basic principles: consumer watchdogs) to monitor and evaluate network • Transparency. Fixed and mobile broadband providers management practices, in order to surface concerns must disclose the network management practices, regarding potential open Internet violations. The rule itself performance characteristics, .and terms and conditions reads: of their broadband services; UA person engaged in the provision of broadband •
Recommended publications
  • Wireless Local Area Networks: Threats and Their Discovery Using Wlans Scanning Tools Ms
    International Journal of Advanced Networking Applications (IJANA) ISSN No. : 0975-0290 137 Wireless Local Area Networks: Threats and Their Discovery Using WLANs Scanning Tools Ms. Rakhi Budhrani Bhavnagar, Gujarat, India. Dr. R. Sridaran, Dean, Faculty of Computer Applications, Marwadi Education Foundation’s Group of Institutions, Rajkot, Gujarat, India. ----------------------------------------------------------------------ABSTRACT-------------------------------------------------------- Wireless Local Area Networks frequently referred to as WLANs or Wi-Fi networks are all the passion in recent times. Wireless networks offer handiness, mobility, and can even be less expensive to put into practice than wired networks in many cases. But how far this technology is going provide a protected environment in terms of privacy is again an anonymous issue. Realizing the miscellaneous threats and vulnerabilities associated with 802.11-based wireless networks and ethically hacking them to make them more secure is what this paper is all about. On this segment, we'll seize a look at common threats, vulnerabilities related with wireless networks. This paper presents an overview some of the WLANs Scanning, Sniffing and Auditing tools available on the internet. This paper Reviews these tools along with their merits, demerits and how they can be used for hacking, exploiting security holes and their usage characterization in WLANs. Keywords - Current threats in WLANs, Exploiting Security, WLANs Scanning, WLANs Sniffing, Multifunctional, WLANs auditing tools penetrate any wired network via wireless network as Access Point (AP) is bridging between wireless and I. INTRODUCTION wired network. Wireless Networks present a host of issues for network managers. Unauthorized access he Institute of Electrical and Electronics points, broadcasted SSIDs, unknown stations, MITM Engineers (IEEE) provides 802.11 set of attacks such as session hijacking and spoofed MAC standards for WLANs.
    [Show full text]
  • Phone User Guide
    Phone User Guide MOTOSLVRTM L7c by Motorola® www.sprint.com © 2006 Sprint Nextel. All rights reserved. SPRINT, the “Going Forward” logo, the NEXTEL name and logo, and other trademarks are trademarks of Sprint Nextel. Printed in the U.S.A. Motorola, Inc. Consumer Advocacy Office 1307 East Algonquin Road Schaumburg, IL 60196 www.hellomoto.com 1-800-331-6456 (United States) 1-888-390-6456 (TTY/TDD United States for hearing impaired) 1-800-461-4575 (Canada) Certain mobile phone features are dependent on the capabilities and settings of your service provider’s network. Additionally, certain features may not be activated by your service provider, and/or the provider's network settings may limit the feature’s functionality. Always contact your service provider about feature availability and functionality. All features, functionality, and other product specifications, as well as the information contained in this user's guide are based upon the latest available information and are believed to be accurate at the time of printing. Motorola reserves the right to change or modify any information or specifications without notice or obligation. © Motorola, Inc., 2006. MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. Software Copyright Notice The Motorola products described in this manual may include copyrighted Motorola and third-party software stored in semiconductor memories or other media. Laws in the United States and other countries preserve for Motorola and third-party software providers certain exclusive rights for copyrighted software, such as the exclusive rights to distribute or reproduce the copyrighted software.
    [Show full text]
  • Mobile Networks and Internet of Things Infrastructures to Characterize Smart Human Mobility
    smart cities Article Mobile Networks and Internet of Things Infrastructures to Characterize Smart Human Mobility Luís Rosa 1,* , Fábio Silva 1,2 and Cesar Analide 1 1 ALGORITMI Centre, Department of Informatics, University of Minho, 4710-057 Braga, Portugal; [email protected] (F.S.); [email protected] (C.A.) 2 CIICESI, School of Management and Technology, Politécnico do Porto, 4610-156 Felgueiras, Portugal * Correspondence: [email protected] Abstract: The evolution of Mobile Networks and Internet of Things (IoT) architectures allows one to rethink the way smart cities infrastructures are designed and managed, and solve a number of problems in terms of human mobility. The territories that adopt the sensoring era can take advantage of this disruptive technology to improve the quality of mobility of their citizens and the rationalization of their resources. However, with this rapid development of smart terminals and infrastructures, as well as the proliferation of diversified applications, even current networks may not be able to completely meet quickly rising human mobility demands. Thus, they are facing many challenges and to cope with these challenges, different standards and projects have been proposed so far. Accordingly, Artificial Intelligence (AI) has been utilized as a new paradigm for the design and optimization of mobile networks with a high level of intelligence. The objective of this work is to identify and discuss the challenges of mobile networks, alongside IoT and AI, to characterize smart human mobility and to discuss some workable solutions to these challenges. Finally, based on this discussion, we propose paths for future smart human mobility researches.
    [Show full text]
  • Innovative Features Driving Mobile Phone Usage by Students in Kenya
    INNOVATIVE FEATURES DRIVING MOBILE PHONE USAGE BY STUDENTS IN KENYA Richard K. Ronoh1, Samuel Mbugua2 and Franklin Wabwoba3 1,2,3 School of Computing and Informatics, Kibabii University, Kenya Abstract-Mobile phone adoption and usage enjoyed drastic and exponential success as far as the history of technology adoption goes. However, there are indications that users are becoming overwhelmed by the unconstraint addition of features and services to the mobile phone guided by the assumption that “more is better”. Currently, mobile phone features present a range of innovations that are rarely useful to majority of users. The result is that many mobile phone features are never used and yet these features significantly contribute to power consumption and cost of the mobile phone. This study investigated innovative phone features that influence mobile phone usage patterns amongst university students in Kenya. In this descriptive analytical study 310 students were selected. Data was collected using a questionnaire and interviews. An average of 24% of respondents indicated that they used most of the features provided by their mobile phones. Provision of appropriate educational programs about beneficial use of mobile phone is quite crucial. Keywords-Mobile phone features, usage patterns, feature clusters I. INTRODUCTION In the 21st century the mobile phone is an indispensible part of everyday life, only found strange when it is absent. Mobile phones are found to be very popular among university students, increasing their social inclusion and correctedness as well as providing a sense of security as they can contact others in times of distress. Kleijnen, et at. ( 2004), economic, social and ergonomic factors are competing to determine the features and functionality included in the design of mobile phone.
    [Show full text]
  • Oracle Communications Mobile Security Gateway
    ` ORACLE DATA SHEET Oracle Communications Mobile Security Gateway The Oracle Communications Mobile Security Gateway is a high-performance gateway that allows the Communications Service Provider (CSP) to cost effectively expand network coverage and increase capacity by incorporating Heterogeneous Networks (HetNets). It secures the delivery of voice and data services from the trusted service provider’s core network through untrusted, internet and/or Wi-Fi access to Wi-Fi devices and femtocells. Network Capacity and Coverage Challenges Mobile data traffic is projected to grow at a 57% CAGR between 2014 and 20191 KEYBUSNIESS BENEFITS stressing the capacity of the macro network. Peaks in demand at stadiums during • Cost effectively improve coverage and increase capacity sporting events or at airports can exceed cell capacity. Further, gaps in coverage leave • Address indoor coverage challenges some areas with no or poor coverage and modern building techniques with reinforced concrete and double glazed windows make indoor coverage a difficult challenge. With • Efficiently improve capacity in the macro network to serve more 80% of traffic being consumed indoors and indoor traffic growing 20% faster than customers outdoor traffic, indoor coverage can significantly impact the customer’s experience. For • Increase customer satisfaction and example, in the hospitality industry it has been reported that 54% of adults will not return decrease churn to a hotel where they have experienced poor cell phone coverage2 resulting in a material • Regain mindshare with customers impact on the business. KEY FEATURES • Safely and securely leverage Wi-Fi and the internet to supplement Macro RAN • Wi-Fi Calling to address indoor voice coverage • Wi-Fi Offload to mitigate macro network expansions • Onload Wi-Fi devices to regain mindshare and create monetization Figure 1: Coverage and Capacity Challenges opportunities Adding additional spectrum is an expensive option to address coverage and capacity • Femtocell support to address issues.
    [Show full text]
  • Deploy Your Chatbots Everywhere Bots Are Taking Over!
    Deploy your Chatbots Everywhere Bots are taking over! By 2021, more than 50% enterprises will spend more on chatbots than traditional mobile apps Source: Gartner Top Strategic Predictions for 2018 and Beyond Every major messaging platform supports Conversational Apps and Chatbots already ➀ Build Once, Deploy to all Messaging Platforms with a Single API Businesses building conversational interfaces typically want to deploy over multiple messaging channels. B2C apps need Consumer Messengers. B2B apps need Enterprise (Team) Messengers. Integrating with each messaging Client System platform is highly resource consuming - Conversational Interface Business Autochat Omni-channel API due to different APIs and capabilities. Logic - Internal API Integrations Autochat provides one-click integrations with most popular messengers. Messages are also auto-translated to match capability of the end messenger. Consumer Messengers Business Messengers FB Messenger, Telegram, Slack, Microsoft Teams, Viber, WeChat, iMessage, Flock, Cisco Spark, Stride, Whatsapp, etc. etc. ➁ Full-featured, Native Messaging SDKs for Web, Android & iOS Many businesses like to enable conversational interfaces within their web and mobile apps as well. This requires building a custom messenger inside their apps. They also need to provide a user experience at par with leading messengers like Facebook Messenger and Slack. Users Client System expect rich messaging features like - Conversational Interface Business Autochat Omni-channel API typing indicators, images, buttons, Logic quick replies, webviews. - Internal API Integrations Autochat provides full featured real time messaging SDKs that can be integrated in no time. Consumer Messengers Business Messengers Native Messaging SDKs FB Messenger, Telegram, Slack, Microsoft Teams, - Web, Android, iOS Viber, WeChat, iMessage, - Feature rich Flock, Cisco Spark, Whatsapp, etc.
    [Show full text]
  • PDF with Notes
    Wireless Tools Training materials for wireless trainers This talk covers tools that will show you a great deal of information about wireless networks, including network discovery, data logging, security auditing, and spectrum analysis. Version 1.4 by Rob, @2009-11-23 Version 1.5 by Rob, @2010-02-28 Version 1.6 by Rob, @2010-03-12 Goals ‣ The goal of this talk is to provide an introduction to a few software tools that will help you to: ‣ monitor your WiFi network to identify problems ‣ perform security audits and prevent attacks ‣ observe the ongoing performance of your network and plan for future needs ‣ detect interference 2 Types of wireless tools ‣ Network ESSID scanners ‣ Wireless protocol analyzers ‣ Encryption cracking tools ‣ Wireless device auditing and management ‣ “War driving” tools: network mapping ‣ Spectrum analysis 3 Built-in wireless clients 4 If a computer has a wireless card, it has a basic network scanner. NetStumbler http://www.stumbler.net/ 5 NetStumbler was one of the first and most widely used WiFi detection tools. It runs only in Windows XP or Windows 2000, and works with many (but not all) wireless cards. NetStumbler can be used for mapping the coverage of your WiFi network, War Driving, rogue AP detection, aligning antennas on a long distance link, and more. NetStumbler is not open source, and was last updated in 2004. http://www.vistumbler.net/ 6 Vistumbler is an updated open source network detection tool for Windows Vista and Windows 7. It supports many of the same features as NetStumbler, including network detection and GPS integration. It also works with Google Earth to allow realtime WiFi mapping on a live map.
    [Show full text]
  • Anti-Terrorism Authority Under the Laws of the United Kingdom and the United States
    Order Code RL33726 CRS Report for Congress Received through the CRS Web Anti-Terrorism Authority Under the Laws of the United Kingdom and the United States September 7, 2006 Clare Feikert Foreign Law Specialist Law Library of Congress Charles Doyle Senior Specialist American Law Division Congressional Research Service ˜ The Library of Congress Anti-Terrorism Authority Under the Laws of the United Kingdom and the United States Summary This is a comparison of the laws of the United Kingdom and of the United States that govern criminal and intelligence investigations of terrorist activities. Both systems rely upon a series of statutory authorizations: in the case of the United States primarily the Foreign Intelligence Surveillance Act and the Electronic Communications Privacy Act; in the case of the United Kingdom, the Regulation of Investigatory Powers Act, the Police Act, the Intelligence Services Act. Among other differences, the U.S. procedures rely more heavily upon judicial involvement and supervision, while those of the UK employ other safeguards. The UK procedures afford greater latitude to arrest, detain and supervise suspected terrorists than those available in the United States. Contents Introduction ......................................................1 Police Stop and Search Powers .......................................3 Police Arrest Powers ...............................................5 Detention of Suspected Terrorists.....................................5 Control Orders....................................................8
    [Show full text]
  • A Novel WLAN Vehicle-To-Anything (V2X) Channel Access Scheme for IEEE 802.11P-Based Next-Generation Connected Car Networks
    applied sciences Article A Novel WLAN Vehicle-To-Anything (V2X) Channel Access Scheme for IEEE 802.11p-Based Next-Generation Connected Car Networks Jinsoo Ahn 1 , Young Yong Kim 1 and Ronny Yongho Kim 2,* 1 School of Electrical & Electronics Engineering, Yonsei University, Seoul 03722, Korea; [email protected] (J.A.); [email protected] (Y.Y.K.) 2 Department of Railroad Electrical and Electronic Engineering, Korea National University of Transportation, Gyeonggi 16106, Korea * Correspondence: [email protected]; Tel.: +82-31-460-0573 Received: 15 September 2018; Accepted: 29 October 2018; Published: 1 November 2018 Featured Application: V2X system for next-generation connected car networks. Abstract: To support a massive number of connected cars, a novel channel access scheme for next-generation vehicle-to-anything (V2X) systems is proposed in this paper. In the design of the proposed scheme, two essential aspects are carefully considered: backward compatibility and massive V2X support. Since IEEE 802.11p-based V2X networks are already being deployed and used for intelligent transport systems, next-generation V2X shall be designed considering IEEE 802.11p-based V2X networks to provide backward compatibility. Since all future cars are expected to be equipped with a V2X communication device, a dense V2X communication scenario will be common and massive V2X communication support will be required. In the proposed scheme, IEEE 802.11-based extension is employed to provide backward compatibility and the emerging IEEE 802.11ax standard-based orthogonal frequency-division multiple access is adopted and extended to provide massive V2X support. The proposed scheme is further extended with a dedicated V2X channel and a scheduled V2X channel access to ensure high capacity and low latency to meet the requirements of the future V2X communication systems.
    [Show full text]
  • Reasons, Rewards, Regrets: Privacy Considerations in Location Sharing As an Interactive Practice
    Reasons, Rewards, Regrets: Privacy Considerations in Location Sharing as an Interactive Practice Sameer Patil, Greg Norcie, Apu Kapadia Adam J. Lee School of Informatics and Computing Department of Computer Science Indiana University University of Pittsburgh 901 E 10th St 210 S Bouquet St Bloomington, IN 47408 USA Pittsburgh, PA 15260 USA {patil, gnorcie, kapadia}@indiana.edu [email protected] ABSTRACT systems focused on enabling collaborators to locate each Rapid growth in the usage of location-aware mobile phones other (e.g., [25, 36]). Such systems typically required orga- has enabled mainstream adoption of location-sharing ser- nizations to install their own location-mapping infrastruc- vices (LSS). Integration with social-networking services ture, either developed in-house by the organization or pur- (SNS) has further accelerated this trend. To uncover how chased from companies such as Ubisense, which offers a 3D localization infrastructure. To scale globally without such these developments have shaped the evolution of LSS usage, 1 we conducted an online study (N = 362) aimed at under- custom infrastructure, services such as Dodgeball allowed standing the preferences and practices of LSS users in the users to send their current locations as text messages to US. We found that the main motivations for location sharing the service, which then alerted friends if they opportunis- were to connect and coordinate with one's social and pro- tically happened to be near each other. Eventually WiFi fessional circles, to project an interesting image of oneself, and GPS-based localization built into smartphones led to and to receive rewards offered for `checking in.' Respon- the development of various stand-alone location-sharing ser- dents overwhelmingly preferred sharing location only upon vices (LSS) such as Foursquare (https://www.foursquare.
    [Show full text]
  • Optical Access Network Migration from GPON to XG-PON
    ACCESS 2012 : The Third International Conference on Access Networks Optical Access Network Migration from GPON to XG-PON Bostjan Batagelj, Vesna Erzen, Vitalii Bagan, Yury Ignatov, Maxim Antonenko Jurij Tratnik, Luka Naglic Moscow Institute for Physics and Technology University of Ljubljana Department of Radio-Electronics Faculty of Electrical Engineering and Applied Informatics Ljubljana, Slovenia Moscow, Russia e-mail: [email protected] e-mail: [email protected] e-mail: [email protected] e-mail: [email protected] e-mail: [email protected] e-mail: [email protected] e-mail: [email protected] Abstract—The purpose of this paper is to give an introduction Present Gigabit-capable Passive Optical Network into the new standard base of next-generation Passive Optical (GPON) as a future safe investment new standard for first Network (NG-PON). Study and analysis of future trends in the generation of Ten-Gigabit-Capable Passive Optical development of next-generation fixed broadband optical Networks (XG-PON1) has been published in 2010 by ITU-T network is performed. The main intention of this paper is to [4]. This standard will offer 10 Gbit/s downstream and 2.5 describe migration from Gigabit-capable Passive Optical Gbit/s upstream speed; but, target distance and split ratio did Network (GPON) to Ten-Gigabit-Capable Passive Optical not increase much. Research in this area continues the job to Networks (XG-PON). Paper answers the question of what bring even better P2MP technology. Most of them are today extent active and passive GPON elements need to be replaced known under the term second generation of next-generation and what needs to be added when migrating to XG-PON.
    [Show full text]
  • Equal Access Networks for Real Broadband Access 2773 EAN Wp V4 10/11/03 9:34 Page 2
    2773_EAN_wp_v4 10/11/03 9:34 Page 1 White paper Equal Access Networks for real broadband access 2773_EAN_wp_v4 10/11/03 9:34 Page 2 Contents 02 The importance of real broadband The importance of real broadband Metropolitan economies are important to the national 03 New opportunities for economy. To make a real contribution to national prosperity, service providers cities need to increase levels of economic growth and become 03 Benefits of an Ethernet-based more competitive. They must also improve the way they are infrastructure governed and managed. 04 Cisco’s ETTx solution Connecting real broadband to a city can change the way whole 06 Benefits of intelligent networks areas work, play and learn. That gives municipalities real 08 Infrastructure for Equal opportunities to deliver better service to tax payers, attract Access Networks more businesses to the area and improve overall prosperity 09 A complete provisioning and competitiveness. solution Metro Ethernet from Cisco is an ideal foundation for real 09 Supporting efficient broadband. Today, almost all network traffic begins and ends as network operation IP, and Ethernet and the Ethernet RJ-45 connector are seen as the 10 Real broadband – the prospects most important form of access to public networks. The Ethernet for residential subscribers to the x (ETTx) Solution is based on Metro Ethernet technology 11 Real broadband – the prospects and utilises IP to provide intelligent network functions. It represents for business subscribers a unified network infrastructure providing end-to-end delivery 12 Business models for of next-generation voice, video, storage and data services. implementing real broadband Equal Access Networks The availability of dark fibre and the economics of Ethernet in the local loop are radically changing access to metropolitan area 14 TV and video solutions networks.
    [Show full text]