Talk by Veljko Pejovic at the University of Cambridge Computer Lab, October 2013.
Abstract: Internet connectivity represents a key factor in the overall development of any nation. It enables competitive participation in the global economy, serves as a valuable source of education and facilitates democratisation of a society. Unfortunately, connectivity opportunities differ drastically among regions. Consequently, this difference, termed “the digital divide”, creates a gap in many aspects of human development: living standard, education, and health care, among others. The essence of the problem lies in a general lack of understanding of developing area dwellers’ needs, and in the design of information and communication technologies (ICTs) without consideration of peculiarities of these areas.
In this talk I will present a holistic approach that aims to improve local and global connectivity of rural, underdeveloped regions. First, we perform an in-depth analysis of the usage of existing technologies in one of the world’s most infrastructure-deprived regions – rural Africa. Our findings show that limitations of current technology severely inhibit higher usage and utility of ICTs in rural areas. We proceed with designing computer networking solutions for rural regions. To cover vast under-populated areas we propose long-range wireless networks based on newly-freed white space spectrum. We develop solutions to physical and MAC layer for white space communication geared towards optimal utilization of limited energy and spectrum resources, and support voice and video, applications that are of primary importance in areas with low population literacy. To avoid over-congested satellite links and reduce unnecessary communication delay we devise a suite of network traffic localization techniques that facilitate local content generation and sharing, enable free local cell phone communication, and improve online social networking in rural areas. We design our solutions after a careful investigation of issues that exist in rural regions and that are relevant to the target population. We strive to go beyond pilots, and, through collaborative work with local stakeholders and researchers, create solutions that will become integral parts of rural lifestyle.
Frontiers of Wireless and Mobile CommunicationsSai Varrshini
This document discusses emerging wireless technologies and their impact. It provides an overview of key technologies like MIMO, cooperative communications, and dynamic spectrum access. It summarizes the evolution of radio technologies from 2G to 4G standards and increasing link speeds. It also examines short-range wireless technologies and research challenges in building cognitive radios and software-defined radios to efficiently utilize spectrum.
Frontiers of wireless and mobile communications v0.02Sai Varrshini
The document discusses a paper on frontiers in wireless technology. It describes how wireless transmission has reached billions of bits per second and mobile services have become internet-based. Emerging technologies like dynamic spectrum access, software-defined radio and MIMO have the potential to increase radio link speeds from MBps to GBps and support new networking concepts. The paper examines the impact of these wireless techniques on audiovisual and multimedia applications.
The document summarizes the evolution of mobile telephone systems from analog to digital technologies. It describes early analog systems like Advanced Mobile Phone System (AMPS) and its features. It then discusses the transition to digital with Digital AMPS (D-AMPS) and the widespread adoption of Global System for Mobile Communications (GSM) as the dominant 2G standard. It also provides a brief overview of Code Division Multiple Access (CDMA) technology and 3G standards like W-CDMA and CDMA2000.
Multimedia multimedia over wireless and mobile networksMazin Alwaaly
This document discusses multimedia over wireless and mobile networks. It begins by outlining the characteristics of wireless channels, including that they are more error-prone than wired channels. It then discusses various wireless networking technologies, including cellular networks from 1G to 4G, wireless local area networks, and Bluetooth. It concludes by discussing challenges for transmitting multimedia over wireless channels and techniques for error detection, error correction, and error concealment to address those challenges.
Cognitive radio networks allow for secondary users to access unused licensed frequencies, known as spectrum holes. The document discusses the history and introduction of cognitive radio, characteristics including cognitive capability, reconfigurable capability, and self-organized capability. It then covers cognitive radio networks architecture including infrastructure-based, ad-hoc, and mesh architectures. It also discusses security issues, attacks on cognitive networks, applications, cognition techniques, and future research directions such as seamless spectrum handovers and proactive spectrum selection and interference avoidance.
These are the notes on mobile computing for Dr. B.A.M University Aurangabad, Maharashtra by Former faculty in PES Engineering College Aurangabad Prof. Nitin S Ujgare
The document provides an overview of cognitive radio networks and spectrum sharing. It discusses how cognitive radio allows for opportunistic and adaptive usage of spectrum. It defines primary and secondary users and describes the cognitive radio network architecture. It then covers spectrum sensing, management, mobility and sharing in cognitive radio systems. Game theory approaches to modeling spectrum sharing are also summarized.
RF Planning and Optimization in GSM and UMTS NetworksApurv Agrawal
The report covers various aspects involved in improving the network coverage as well as the parameters used in planning of new network sites for GSM and UMTS networks.
Frontiers of Wireless and Mobile CommunicationsSai Varrshini
This document discusses emerging wireless technologies and their impact. It provides an overview of key technologies like MIMO, cooperative communications, and dynamic spectrum access. It summarizes the evolution of radio technologies from 2G to 4G standards and increasing link speeds. It also examines short-range wireless technologies and research challenges in building cognitive radios and software-defined radios to efficiently utilize spectrum.
Frontiers of wireless and mobile communications v0.02Sai Varrshini
The document discusses a paper on frontiers in wireless technology. It describes how wireless transmission has reached billions of bits per second and mobile services have become internet-based. Emerging technologies like dynamic spectrum access, software-defined radio and MIMO have the potential to increase radio link speeds from MBps to GBps and support new networking concepts. The paper examines the impact of these wireless techniques on audiovisual and multimedia applications.
The document summarizes the evolution of mobile telephone systems from analog to digital technologies. It describes early analog systems like Advanced Mobile Phone System (AMPS) and its features. It then discusses the transition to digital with Digital AMPS (D-AMPS) and the widespread adoption of Global System for Mobile Communications (GSM) as the dominant 2G standard. It also provides a brief overview of Code Division Multiple Access (CDMA) technology and 3G standards like W-CDMA and CDMA2000.
Multimedia multimedia over wireless and mobile networksMazin Alwaaly
This document discusses multimedia over wireless and mobile networks. It begins by outlining the characteristics of wireless channels, including that they are more error-prone than wired channels. It then discusses various wireless networking technologies, including cellular networks from 1G to 4G, wireless local area networks, and Bluetooth. It concludes by discussing challenges for transmitting multimedia over wireless channels and techniques for error detection, error correction, and error concealment to address those challenges.
Cognitive radio networks allow for secondary users to access unused licensed frequencies, known as spectrum holes. The document discusses the history and introduction of cognitive radio, characteristics including cognitive capability, reconfigurable capability, and self-organized capability. It then covers cognitive radio networks architecture including infrastructure-based, ad-hoc, and mesh architectures. It also discusses security issues, attacks on cognitive networks, applications, cognition techniques, and future research directions such as seamless spectrum handovers and proactive spectrum selection and interference avoidance.
These are the notes on mobile computing for Dr. B.A.M University Aurangabad, Maharashtra by Former faculty in PES Engineering College Aurangabad Prof. Nitin S Ujgare
The document provides an overview of cognitive radio networks and spectrum sharing. It discusses how cognitive radio allows for opportunistic and adaptive usage of spectrum. It defines primary and secondary users and describes the cognitive radio network architecture. It then covers spectrum sensing, management, mobility and sharing in cognitive radio systems. Game theory approaches to modeling spectrum sharing are also summarized.
RF Planning and Optimization in GSM and UMTS NetworksApurv Agrawal
The report covers various aspects involved in improving the network coverage as well as the parameters used in planning of new network sites for GSM and UMTS networks.
Cognitive radio network_MS_defense_presentationIffat Anjum
The document appears to be a student thesis that discusses medium access control (MAC) protocols for coexisting cognitive radio networks (CCRNs). It proposes a new distributed and quality of service aware MAC protocol called WF-MAC. WF-MAC aims to enable fair channel sharing among multiple CCRNs while maintaining QoS sensitivity and maximizing spectrum utilization. It achieves this through a two dimensional learning mechanism for channel selection based on perception and availability prediction.
The document discusses cognitive radio and its benefits. It defines cognitive radio as a radio that is aware of its surroundings and adapts intelligently. Cognitive radio provides a framework for devices to dynamically create links by sensing the environment, evaluating options, and implementing the best waveform. This allows for improved spectrum utilization and quality of service. Some applications of cognitive radio include extending mobile networks, emergency radio systems, and multi-technology phones.
This document examines the viability of providing broadband wireless access (BWA) using cognitive radios operating in the TV broadcast bands under different licensing models and in urban versus rural areas. It develops a general analysis tool to evaluate the spectrum requirements and cost-effectiveness of BWA networks under six scenarios that vary based on licensing approach (unlicensed, nonexclusive licensed, exclusive licensed) and location (urban, rural). Key factors like population density, transmission range, available spectrum, user traffic, spectral efficiency and spectrum cost are considered. Results indicate unlicensed BWA may be viable in rural areas due to long transmission ranges and abundant available spectrum, but not in dense urban areas with limited unused TV channels and short feasible ranges.
Cognitive Radio: When might it Become Economically and Technically Feasible? Jeffrey Funk
My Master's students use ideas from my (Jeff Funk) forthcoming book (Technology Change and the Rise of New Industries) to analyze the economic and technical feasibility of cognitive radio. See my other slides for details on concepts, methodology, and other new industries.
Cognitive radio is a form of software-defined radio that can be used to address the spectrum crunch by detecting unused spectrum ("spectrum holes") and transmitting on those frequencies without interfering with the licensed users. It works by constantly sensing its operating environment and adapting its transmission parameters, such as frequency band or power level. This allows cognitive radios to opportunistically use vacant spectrum while avoiding occupied bands. Some challenges to the technology include developing specialized hardware, synchronization between devices, and preventing security vulnerabilities or false interference readings.
Handover for 5G Networks using Fuzzy Logic: A ReviewAI Publications
The future organization world will be inserted with various ages of remote advances, like 4G and 5G. Simultaneously, the advancement of new gadgets outfitted with different interfaces is filling quickly as of late. As a result, the upward handover convention is created to give pervasive availability in the heterogeneous remote climate. Handover might be a fundamental a piece of any remote Mobile Communication Network. It is a way of mobile communication and portable communication during which cellular broadcast is relocate from one base station to another without losing connection to the mobile communication. Handover is one problem on Wireless Network (WN) and to unravel this problem various sorts of HO methods utilized in network. Fuzzy logic, Machine Learning and Optimization are the handover solving methods that are studied during this paper. This paper is a review of the handoff techniques. Fuzzy logic is that the best technique to unravel the HO problem and it's further implemented in 4G/5G network.
UNIT III
MOBILE COMMUNICATION SYSTEMS
GSM-architecture-Location tracking and call setup- Mobility management- Handover-Security-GSM SMS –International roaming for GSM- call recording functions-subscriber and service data mgt –-Mobile Number portability -VoIP service for Mobile Networks –GPRS –Architecture-GPRS procedures-attach and detach procedures-PDP context procedure-combined RA/LA update procedures-Billing
The document discusses spectrum usage and dynamic spectrum access. It notes that current spectrum policies result in inefficient usage, with some blocks saturated and others underused. Improved flexibility and regulation are needed. Context-aware applications and cross-layer optimization, including flexible spectrum use, could enhance service. Most discussions focus on cognitive radio and how it can intelligently manage radio systems and networks to better utilize spectrum.
This document discusses cognitive radio networks and security issues within them. It begins with an introduction to cognitive radio and its ability to identify unused spectrum. It then describes two common attacks on cognitive radio networks: incumbent emulation attacks and spectrum sensing data falsification attacks. The document reviews several detection techniques for these attacks, including evaluating trust values and consistency, using reputation metrics, and analyzing statistics. Finally, it discusses some applications and advantages of cognitive radio networks, as well as topics for further research.
Wireless networks can use a variety of technologies to connect devices without cables over different ranges. Short-range personal area networks connect devices within arm's reach using technologies like Bluetooth, while local area networks use WiFi to connect devices within a building. Wireless performance is ultimately limited by available bandwidth and the signal-to-noise ratio between transmitting and receiving devices. Real-world throughput is often lower than theoretical maximums due to interference, distance between devices, and other factors that impact signal quality.
Introduction to Wireless MIMO – Theory and ApplicationsJacob Sharony
Spatial Multiplexing (SM)-the “Secret Sauce” of MIMO. SM delivers parallel streams of data to CPE by exploiting multi-path. It can double (2x2 MIMO) or quadruple (4x4) capacity and throughput. SM gives higher capacity when RF conditions are favorable and users are closer to the BTS.
IEEE LI, November 15, 2006.
Traffic Offloading Solutions: Femto, WiFi and Integrated Femto-WiFiShristi Pradhan
I provide a comprehensive overview on various traffic offloading solutions:
1. Femtocells, which provides the benefits of scalability, automatic configuration and self-optimization.
2. WiFi, widely available in homes and hotspots.
3. Integrating femto and WiFi together to reap the benefits of both femtocell and WiFi technology.
CR technology is based on the fact that the licensed systems (also named primary systems PS) are not always using their spectrum bands; CR brings new radio types—cognitive radios—that should firstly, identify the existing spectrum holes, and secondly, utilize them according to an access
Introduction wireless communication networkRiazul Islam
The document provides an overview of wireless communications and networks. It discusses the history of wireless technologies and how digital communications provide noise immunity over analog signals. It also describes the basic components of a communication system including the transmitter, channel, and receiver. Additionally, it defines key terms related to wireless systems such as mobile station, base station, and handoff. The document outlines some examples of wireless communication systems and highlights challenges in wireless communications compared to wired systems.
This document discusses using cognitive radio networks to enable smart grid applications. It begins by introducing smart grids and their need to overcome challenges in aging infrastructure and growing energy demands. It then discusses cognitive radio networks, which can opportunistically access licensed spectrum without interfering with licensed users. The document outlines the key components of cognitive radio networks and smart grids, and proposes using cognitive radio networks to enable smart grid applications at the home area network, neighborhood area network, and wide area network levels. Specifically, it suggests cognitive radio technologies could manage spectrum sharing among smart meters and grid components to improve efficiency and flexibility of smart grid operations.
The document discusses emerging wireless technologies beyond 3G, focusing on potential 4G technologies. It provides an overview of the evolution from 1G to 2G to 3G mobile networks and their basic functions. 4G is envisioned to provide greatly increased speeds up to 100 Mbps, full multimedia capabilities, and improved quality of service. Challenges to implementing 4G include developing compatible network architectures, managing spectrum and bandwidth, and providing reliability comparable to wired networks. 4G could enable new public safety applications like location services, telemedicine, and improved crisis management.
This document discusses cognitive radio, including its definition, history, key concepts, and applications. It begins with an introduction to software defined radio and cognitive radio. It then covers spectrum sensing, management, and different sensing techniques. The document discusses how cognitive radios know their environment and can adapt based on learning. It also describes cooperative and non-cooperative sensing approaches and lists some challenges of cognitive radio technology. The applications and advantages of cognitive radio are summarized before concluding with an admission that cognitive radio is still an area of active research.
This document provides a summary of a term paper on cognitive radio. It discusses key topics such as what cognitive radio is, its advantages over static spectrum allocation, key drivers for cognitive radio like dynamic spectrum access and cognitive radio networks, challenges to deployment including legal hurdles, security issues, and technology hurdles related to spectrum sensing. Promising applications of cognitive radio mentioned include emergency services, low cost internet access, and new services enabled by intelligent radio-based advertising.
This document outlines the coursework for an architectural graphics course taught in Rhino 3D software. Over 8 weeks, students completed a series of exercises and projects to learn Rhino's basic tools and techniques. These included creating a pear with sweep and revolve tools, iterating a textile pattern, designing a chair with an arrayed surface pattern, and beginning a fruit morphology project. Reflections addressed difficulties with certain tools on Mac versus PC and using patterns on surfaces. The course aimed to build proficiency in Rhino through practice projects modeling forms.
This document discusses a case study of the Youth Community Multimedia Centre (YCMC) in rural Bangladesh. YCMC was established in 2004 to provide information and technology training to local communities. It aims to reduce poverty and the digital divide through initiatives like workshops, information dissemination, and developing audio/video contents on social issues. Interviews with users and observations at YCMC found that it provides an important community learning space, especially for empowering women through basic computer training and employment opportunities. However, its long-term sustainability depends on maintaining the four resources outlined in Heeks' information chain model: technology, organizational, financial, and human.
Cognitive radio network_MS_defense_presentationIffat Anjum
The document appears to be a student thesis that discusses medium access control (MAC) protocols for coexisting cognitive radio networks (CCRNs). It proposes a new distributed and quality of service aware MAC protocol called WF-MAC. WF-MAC aims to enable fair channel sharing among multiple CCRNs while maintaining QoS sensitivity and maximizing spectrum utilization. It achieves this through a two dimensional learning mechanism for channel selection based on perception and availability prediction.
The document discusses cognitive radio and its benefits. It defines cognitive radio as a radio that is aware of its surroundings and adapts intelligently. Cognitive radio provides a framework for devices to dynamically create links by sensing the environment, evaluating options, and implementing the best waveform. This allows for improved spectrum utilization and quality of service. Some applications of cognitive radio include extending mobile networks, emergency radio systems, and multi-technology phones.
This document examines the viability of providing broadband wireless access (BWA) using cognitive radios operating in the TV broadcast bands under different licensing models and in urban versus rural areas. It develops a general analysis tool to evaluate the spectrum requirements and cost-effectiveness of BWA networks under six scenarios that vary based on licensing approach (unlicensed, nonexclusive licensed, exclusive licensed) and location (urban, rural). Key factors like population density, transmission range, available spectrum, user traffic, spectral efficiency and spectrum cost are considered. Results indicate unlicensed BWA may be viable in rural areas due to long transmission ranges and abundant available spectrum, but not in dense urban areas with limited unused TV channels and short feasible ranges.
Cognitive Radio: When might it Become Economically and Technically Feasible? Jeffrey Funk
My Master's students use ideas from my (Jeff Funk) forthcoming book (Technology Change and the Rise of New Industries) to analyze the economic and technical feasibility of cognitive radio. See my other slides for details on concepts, methodology, and other new industries.
Cognitive radio is a form of software-defined radio that can be used to address the spectrum crunch by detecting unused spectrum ("spectrum holes") and transmitting on those frequencies without interfering with the licensed users. It works by constantly sensing its operating environment and adapting its transmission parameters, such as frequency band or power level. This allows cognitive radios to opportunistically use vacant spectrum while avoiding occupied bands. Some challenges to the technology include developing specialized hardware, synchronization between devices, and preventing security vulnerabilities or false interference readings.
Handover for 5G Networks using Fuzzy Logic: A ReviewAI Publications
The future organization world will be inserted with various ages of remote advances, like 4G and 5G. Simultaneously, the advancement of new gadgets outfitted with different interfaces is filling quickly as of late. As a result, the upward handover convention is created to give pervasive availability in the heterogeneous remote climate. Handover might be a fundamental a piece of any remote Mobile Communication Network. It is a way of mobile communication and portable communication during which cellular broadcast is relocate from one base station to another without losing connection to the mobile communication. Handover is one problem on Wireless Network (WN) and to unravel this problem various sorts of HO methods utilized in network. Fuzzy logic, Machine Learning and Optimization are the handover solving methods that are studied during this paper. This paper is a review of the handoff techniques. Fuzzy logic is that the best technique to unravel the HO problem and it's further implemented in 4G/5G network.
UNIT III
MOBILE COMMUNICATION SYSTEMS
GSM-architecture-Location tracking and call setup- Mobility management- Handover-Security-GSM SMS –International roaming for GSM- call recording functions-subscriber and service data mgt –-Mobile Number portability -VoIP service for Mobile Networks –GPRS –Architecture-GPRS procedures-attach and detach procedures-PDP context procedure-combined RA/LA update procedures-Billing
The document discusses spectrum usage and dynamic spectrum access. It notes that current spectrum policies result in inefficient usage, with some blocks saturated and others underused. Improved flexibility and regulation are needed. Context-aware applications and cross-layer optimization, including flexible spectrum use, could enhance service. Most discussions focus on cognitive radio and how it can intelligently manage radio systems and networks to better utilize spectrum.
This document discusses cognitive radio networks and security issues within them. It begins with an introduction to cognitive radio and its ability to identify unused spectrum. It then describes two common attacks on cognitive radio networks: incumbent emulation attacks and spectrum sensing data falsification attacks. The document reviews several detection techniques for these attacks, including evaluating trust values and consistency, using reputation metrics, and analyzing statistics. Finally, it discusses some applications and advantages of cognitive radio networks, as well as topics for further research.
Wireless networks can use a variety of technologies to connect devices without cables over different ranges. Short-range personal area networks connect devices within arm's reach using technologies like Bluetooth, while local area networks use WiFi to connect devices within a building. Wireless performance is ultimately limited by available bandwidth and the signal-to-noise ratio between transmitting and receiving devices. Real-world throughput is often lower than theoretical maximums due to interference, distance between devices, and other factors that impact signal quality.
Introduction to Wireless MIMO – Theory and ApplicationsJacob Sharony
Spatial Multiplexing (SM)-the “Secret Sauce” of MIMO. SM delivers parallel streams of data to CPE by exploiting multi-path. It can double (2x2 MIMO) or quadruple (4x4) capacity and throughput. SM gives higher capacity when RF conditions are favorable and users are closer to the BTS.
IEEE LI, November 15, 2006.
Traffic Offloading Solutions: Femto, WiFi and Integrated Femto-WiFiShristi Pradhan
I provide a comprehensive overview on various traffic offloading solutions:
1. Femtocells, which provides the benefits of scalability, automatic configuration and self-optimization.
2. WiFi, widely available in homes and hotspots.
3. Integrating femto and WiFi together to reap the benefits of both femtocell and WiFi technology.
CR technology is based on the fact that the licensed systems (also named primary systems PS) are not always using their spectrum bands; CR brings new radio types—cognitive radios—that should firstly, identify the existing spectrum holes, and secondly, utilize them according to an access
Introduction wireless communication networkRiazul Islam
The document provides an overview of wireless communications and networks. It discusses the history of wireless technologies and how digital communications provide noise immunity over analog signals. It also describes the basic components of a communication system including the transmitter, channel, and receiver. Additionally, it defines key terms related to wireless systems such as mobile station, base station, and handoff. The document outlines some examples of wireless communication systems and highlights challenges in wireless communications compared to wired systems.
This document discusses using cognitive radio networks to enable smart grid applications. It begins by introducing smart grids and their need to overcome challenges in aging infrastructure and growing energy demands. It then discusses cognitive radio networks, which can opportunistically access licensed spectrum without interfering with licensed users. The document outlines the key components of cognitive radio networks and smart grids, and proposes using cognitive radio networks to enable smart grid applications at the home area network, neighborhood area network, and wide area network levels. Specifically, it suggests cognitive radio technologies could manage spectrum sharing among smart meters and grid components to improve efficiency and flexibility of smart grid operations.
The document discusses emerging wireless technologies beyond 3G, focusing on potential 4G technologies. It provides an overview of the evolution from 1G to 2G to 3G mobile networks and their basic functions. 4G is envisioned to provide greatly increased speeds up to 100 Mbps, full multimedia capabilities, and improved quality of service. Challenges to implementing 4G include developing compatible network architectures, managing spectrum and bandwidth, and providing reliability comparable to wired networks. 4G could enable new public safety applications like location services, telemedicine, and improved crisis management.
This document discusses cognitive radio, including its definition, history, key concepts, and applications. It begins with an introduction to software defined radio and cognitive radio. It then covers spectrum sensing, management, and different sensing techniques. The document discusses how cognitive radios know their environment and can adapt based on learning. It also describes cooperative and non-cooperative sensing approaches and lists some challenges of cognitive radio technology. The applications and advantages of cognitive radio are summarized before concluding with an admission that cognitive radio is still an area of active research.
This document provides a summary of a term paper on cognitive radio. It discusses key topics such as what cognitive radio is, its advantages over static spectrum allocation, key drivers for cognitive radio like dynamic spectrum access and cognitive radio networks, challenges to deployment including legal hurdles, security issues, and technology hurdles related to spectrum sensing. Promising applications of cognitive radio mentioned include emergency services, low cost internet access, and new services enabled by intelligent radio-based advertising.
This document outlines the coursework for an architectural graphics course taught in Rhino 3D software. Over 8 weeks, students completed a series of exercises and projects to learn Rhino's basic tools and techniques. These included creating a pear with sweep and revolve tools, iterating a textile pattern, designing a chair with an arrayed surface pattern, and beginning a fruit morphology project. Reflections addressed difficulties with certain tools on Mac versus PC and using patterns on surfaces. The course aimed to build proficiency in Rhino through practice projects modeling forms.
This document discusses a case study of the Youth Community Multimedia Centre (YCMC) in rural Bangladesh. YCMC was established in 2004 to provide information and technology training to local communities. It aims to reduce poverty and the digital divide through initiatives like workshops, information dissemination, and developing audio/video contents on social issues. Interviews with users and observations at YCMC found that it provides an important community learning space, especially for empowering women through basic computer training and employment opportunities. However, its long-term sustainability depends on maintaining the four resources outlined in Heeks' information chain model: technology, organizational, financial, and human.
The presentation is basically meant for rural development managers.
It may also help the NGO activists in rural set up having local bodies to work with
Mahmuda Mutahara "towards preachin what is practiced?"Arjen Zegwaard
This document summarizes a PhD research project on strengthening community resilience to flooding in rural Bangladesh. The project will identify community perceptions of flooding and how water management has impacted livelihoods. It will compare community views to water management practices in Bangladesh and the Dutch delta. An indicator framework will be developed to assess resilience at the community level. The research will develop a multi-actor learning approach to enhance resilience through knowledge sharing with the community. Data collection methods will include interviews, surveys, and participatory activities with communities in flood-prone areas of Bangladesh.
- Bangladesh has over 700 rivers divided among 4 river systems. The southwest region has over 170 rivers and is dominated by tidal rivers.
- To increase agriculture and food security, polders were constructed in the 1960s, blocking tidal flows and causing widespread waterlogging over subsequent decades.
- In response, local people organized and cut embankments in 1997, draining 70,000 hectares and restoring livelihoods. However, government projects failed to incorporate local knowledge and worsened waterlogging.
- Future interventions should embed community-led approaches like locally initiated tidal river management for effective long-term solutions.
A rural area is defined as a geographic area outside of cities and towns that typically has a low population density and small settlements. Rural areas often involve agricultural uses and have ample open space between houses. The main objectives of rural development programs in the Philippines are to build infrastructure, improve health, education, living conditions, and generate employment opportunities through various initiatives like agrarian reform, cooperatives, and labor-intensive industries. Key government agencies overseeing rural development include the Cooperative Development Authority and programs focus on issues like nutrition, family planning, and rural electrification.
Lecture 4: Urban & Regional Planning (Risk Mitigation Concept)Bayes Ahmed
This document provides an overview of a master plan for the city of Sylhet in Bangladesh. It discusses the objectives of master plans, which include guiding development, coordinating land uses, and planning for current and future needs. The Sylhet master plan covers an 85 square kilometer area and divides it into 12 zones. It includes proposals for transportation infrastructure, utilities, land use, housing, industry, tourism and the environment. The plan's policies aim to organize urban growth, develop infrastructure, utilize public land, improve transportation access, and protect natural resources like rivers and hills.
Lecture 2: Urban & Regional Planning (Risk Mitigation Concept)Bayes Ahmed
This document provides an overview of urban and rural settlement types and definitions. It discusses how settlements are classified based on size and function into urban and rural areas. Urban settlements tend to have non-agricultural economies with high population densities and infrastructure, while rural settlements rely on agriculture and have lower population densities. The document also defines terms like city, town, suburb, and provides the criteria for declaring an area urban under Bangladesh law.
The document discusses unemployment in rural areas of India. It defines unemployment and describes the different types, including open unemployment during seasonal periods for farmers, concealed or disguised unemployment where more workers are employed than necessary, and educated rural unemployment where more people are educated than there are jobs. The main causes of rural unemployment are rapid population growth, small landholdings, seasonal agriculture, and lack of alternative employment opportunities. Some solutions proposed include improving agriculture through irrigation, crop rotation, and use of machinery; developing small industries; public works programs; and controlling population growth.
Major accidents & their prevention in rural & urban areasCharmi Doshi
According to a WHO report, accidents cause over 3.5 million deaths annually, which is more than any other single cause of death. Accidents can occur in a variety of environments, but the home is the most common location. Home accidents are a major cause of injury and economic costs. In India, the leading causes of accidental death are road accidents (34.5%), poisoning (7.9%), and fire-related accidents (6.6%). Prevention strategies include implementing integrated road safety policies, forming independent road safety agencies, improving trauma care, and promoting safety awareness among policymakers and the public. Common sense measures like securing cleaning products, removing obstacles, and monitoring flames can help prevent many home accidents.
This document discusses railway disasters in India, including causes and types of accidents as well as safety measures. It notes that railway disasters are defined as serious train accidents that result in significant loss of life or injury. The types of accidents discussed include those caused by natural disasters, train accidents, and man-made causes. Statistics on rail accidents in India between 2009-2014 are provided, including the worst accidents in terms of loss of life. Safety tips for passengers and measures taken by Indian railways to prevent accidents are outlined. These include education campaigns, safety inspections, and technologies to detect fires and prevent collisions. Improved infrastructure, staffing, and fire detection systems are areas seen as needing urgent attention to enhance railway safety.
Rural marketing involves assessing, stimulating, and converting purchasing power in rural areas to create demand for products and services. India's vast rural market offers potential for marketers facing urban competition. Rural consumers have customs and behaviors that differ from urban areas. Improving rural incomes, infrastructure, health, education, and employment opportunities can help realize the vision of a modern rural economy. Marketers have entered rural markets by extending existing product distributions or developing separate rural strategies. The growing interest in rural markets is due to their large size, untapped potential, and increasing incomes.
The document discusses rural development in India. It outlines how the concept of rural development has changed over time, from a focus on agriculture to a more holistic approach addressing quality of life. Some key challenges include high rural poverty rates, especially among scheduled castes and tribes. The document then discusses various government programs and approaches over the decades to promote rural development, community development, empowering local governments, and more recent programs focusing on employment, infrastructure, housing, and social services.
Dr. Katundu is a lecturer at the Moshi Co-operative University (MoCU). He works under the Department of Community and Rural Development specializing in the area of rural development. He holds a PhD and Master of Arts in Rural development from the Sokoine University of Agriculture (SUA), Morogoro Tanzania and a Bachelor of Arts (Hons) in Geography and Environmental Studies from the University of Dar-Es-Salaam, Tanzania. His research interests include: Agriculture and rural development, rural land reform, rural livelihoods and cooperatives, community driven development, environment and natural resource management, entrepreneurship development, impact evaluation. His PhD thesis is titled: Entrepreneurship Education and Business Start Up: Assessing Entrepreneurial Tendencies among University Graduates in Tanzania whereas; Master dissertation is titled: Evaluation of the Association of Tanzania Tobacco Traders’ Reforestation Programme: The Case of Urambo District.
Rural development is a complex process that aims to improve living conditions in rural areas. It requires integrated efforts across sectors like infrastructure, public services, health, education, employment and standard of living. While the government and private sector have undertaken development initiatives, rural areas still lag significantly behind cities in these areas. Effective rural development strategies require addressing issues like inadequate infrastructure, lack of opportunities, traditional mindsets, and ensuring balanced growth between rural and urban regions.
Rural areas are separately settled places away from large cities characterized by lower population density and engagement in primary industries like agriculture. A rural community has a sense of unity and religion plays an important role in village life. Rural lifestyles differ from urban ones in having limited services, public transport, and utilities. Rural development aims to improve the economic and social conditions of rural poor through collective efforts and generation of employment in farm, storage, and other economic activities while also developing infrastructure, health, education, and living conditions. It faces various challenges including traditional mindsets, lack of education, inadequate infrastructure, and economic and leadership problems. Rural development is important for India to develop rural areas holistically and empower communities.
The document discusses the benefits of exercise for both physical and mental health. It notes that regular exercise can reduce the risk of diseases like heart disease and diabetes, improve mood, and reduce feelings of stress and anxiety. The document recommends that adults get at least 150 minutes of moderate exercise or 75 minutes of vigorous exercise per week to gain these benefits.
This document provides an overview of the ECE5XX course on Principles of Digital Communications Systems. The course aims to provide a comprehensive coverage of digital communication theory and design at a graduate level. The first half will cover theoretical foundations, and the second half will cover advanced techniques. Key topics include optimal receiver design, signaling, multiple access techniques like CDMA and OFDM, and MIMO systems. Students are expected to understand digital communication principles and design optimal receivers. Evaluation will be based on exams, assignments, a project, and a paper presentation.
- Professor Andrew Nix gave a presentation on 5G and beyond communication from a Bristol perspective. He discussed the Communication Systems & Networks group at the University of Bristol, their work on mmWave simulations and beamforming for 5G, applications for automotive, and their leadership in European 5G research projects. He highlighted Bristol's testbeds and infrastructure for innovations in areas like the Internet of Things and smart cities.
LTE provides higher data rates and lower latency compared to 3G technologies through wider bandwidth and an all-IP architecture. It utilizes scheduling at base stations to optimize channel quality and supports mobility and broadband services. Key aspects include enhanced base stations, a simplified core network, and power management techniques for user equipment to improve battery life. LTE aims to deliver real mobile broadband and meet increasing demand for high-speed internet access.
This document provides an introduction to wireless communication and wireless application protocol (WAP). It discusses the benefits of wireless communication like freedom from wires and global coverage. It also covers some of the technical challenges in wireless communication like efficient use of spectrum, mobility support, and maintaining quality of service over unreliable links. It defines wireless communication and differentiates between wireless and mobile. It also describes various types of wireless technologies and their limitations.
This document provides an overview of communication and computer networks. It begins with a brief history of communication methods such as smoke signals and drums. It then introduces computer networks, distinguishing between wide area networks that connect multiple locations over long distances, and local/metropolitan area networks that operate within a limited geographical scope. The document discusses how networks allocate and share resources among users. It also outlines some of the challenges in integrating different network services and maintaining security.
Types o Wireless Networks in computer networksPonniS7
Wireless networks provide wireless interfaces to users by supporting bandwidth allocation and error-control functions. There are different types of wireless networks such as wireless local area networks (WLANs), mobile networks, and sensor networks. Each network faces various challenges including lower bandwidth capacity, interference, security issues, and power constraints depending on the network type.
- Wireless communication allows information to be transferred between points without wires. It has advantages like mobility but also disadvantages like security issues and interference.
- There are many different types of wireless systems including cellular networks, wireless LANs, satellite systems, paging systems, and Bluetooth. Requirements of wireless services include data rate, range, mobility, energy consumption, and quality of service.
- Key technical challenges in wireless communication include propagation effects, multipath, fading, interference, and limitations of spectrum and energy. Noise-limited systems require maintaining a minimum signal-to-noise ratio between transmitter and receiver.
This document provides an introduction to an advanced wireless and mobile computing networks course. It outlines the course objectives which include familiarizing students with state-of-the-art wireless networks, relevant data transmission techniques, radio localization, and cellular communication concepts. It also provides an overview of the course contents, textbook, grading scheme, and expectations. The instructor is identified and contact information is provided.
This document discusses quality of service (QoS) provisioning in wireless multimedia networks. It describes QoS challenges in wireless networks due to limited bandwidth, unreliable links, and varying channel conditions. It also discusses the characteristics of multimedia services and traffic modeling challenges. The document outlines IEEE 802.11 MAC layer enhancements including the distributed coordination function, point coordination function, and IEEE 802.11e standard for supporting QoS through enhanced distributed channel access and hybrid coordination function. It emphasizes the need for end-to-end QoS, adaptive frameworks, and call admission control for wireless multimedia networks.
- The document discusses key concepts in wireless technologies including wireless transmission fundamentals, global cellular networks, broadband wireless, Bluetooth, and future trends such as WiMAX, Mobile-Fi, ZigBee, and Ultrawideband.
- It covers analog and digital signaling and transmission, channel capacity, advantages and disadvantages of wireless communication, and types of wireless communication systems including Bluetooth applications and usage.
Block diagonalization for Multi-user MIMO Beamforming Performance over Rician...IRJET Journal
This document discusses block diagonalization (BD) precoding performance in multi-user multiple-input multiple-output (MU-MIMO) beamforming systems over Rician fading channels. It begins with an abstract that introduces BD precoding as a linear precoding method for MU-MIMO broadcast channels that transmits interference-free data streams to multiple users by designing beamforming vectors. The document then evaluates BD precoding performance over both Rayleigh and Rician fading channels through simulation. The results show that the Rician fading channel provides better error rate performance than the Rayleigh channel, especially at low Rician factors.
This document discusses the requirements for developing new channel models to support 5G wireless networks. 5G networks will operate at higher frequencies between 500 MHz to 100 GHz, requiring new channel models. Key requirements for 5G channel models include supporting a wide frequency range, large bandwidths, various propagation scenarios, 3D modeling, smooth time evolution, spatial consistency, frequency dependency, massive MIMO, high mobility, and device-to-device communication. Accurate modeling is needed to understand signal propagation for 5G network planning and performance optimization.
This document provides an overview of analog and digital data transmission and optical fibers. It discusses how analog signals carry data continuously while digital signals carry data in discrete pulses. It also explains the advantages of digital transmission such as noise immunity, multiplexing capability, and ability to detect errors. The document then describes how optical fibers transmit data using total internal reflection and their construction. It discusses the types of optical fibers and their properties. Finally, it outlines the advantages and applications of optical fibers, including their high bandwidth, low loss, immunity to interference, flexibility and secure transmission.
This document presents a middle-mile multihop mesh network using TV UHF band spectrum as a solution for providing rural broadband coverage in India. The key contributions are an optimization tool that determines the minimum transmit power needed for broadband coverage given inputs like demography, fiber point of presence locations, and propagation models. The tool assigns optimal routes and calculates achievable throughputs using time division multiple access and spatial reuse to manage interference. The analysis is done at the physical layer to determine broadband feasibility in rural areas using just the available TV UHF spectrum.
This document summarizes a presentation on radio network planning for 3G networks. It discusses key concepts in radio network planning like cell configuration, interference management, frequency reuse, and mobile network evolution. It then covers the specific steps in 3G radio network planning, including dimensioning, nominal planning, simulation, and optimization. The document provides examples of link budget calculations and using planning software to simulate network performance and verify the design meets requirements.
Enabling Device-to-Device Communications in Millimeter-Wave 5G Cellular Netw...Naresh Biloniya
Enabling Device-to-Device Communications in Millimeter-Wave 5G Cellular Networks
* Features of Millimeter wave
* Architecture of 5G cellular network
* Challenges and Scope of 5G network
Service-aware Networks over Shared Wireless Access InfrastructureCPqD
1. The document discusses a vision for future wireless networks based on sharing infrastructure and virtualizing networks to improve efficiency and lower costs.
2. It proposes algorithms for optimizing the placement of private and shared infrastructure to minimize costs while meeting traffic demands and regulatory requirements.
3. The results show that increasing the proportion of traffic served by private infrastructure leads to higher deployment costs and idle capacity, with most efficiency gains coming from high data rate traffic in urban areas being served by shared infrastructure.
This document summarizes a presentation about using massive MIMO technology for 5G cellular networks below 6 GHz. The key points are:
1) Massive MIMO uses a large number of antennas at base stations to form highly directional beams, which improves spectral efficiency and provides uniform coverage across cells.
2) It enables high spectral efficiency through spatial multiplexing of many users simultaneously. Field tests have achieved over 145 bit/s/Hz per cell.
3) Massive MIMO also enhances link reliability and enables new use cases like IoT that require low power and high reliability connections between devices. The array gain from many antennas provides flexibility to either increase communication ranges or operate at much lower transmit powers.
BROADBAND POWER LINE COMMUNICATION: THE CHANNEL AND NOISE ANALYSIS FOR A POWE...IJCNCJournal
The scope for broadband powerline Communication is considered as a retrofit technology for wide geographical coverage wherever the human habitation exists. So during the last decade, it has drawn an enormous quantity of research work for improving communication performance and this system being standardized all over the world. The broadband power line Communication channel modelling is essential in the design of a reliable communications system. An analysis on the proposed channel model is conducted in this paper; also the paper studied the noises in Broadband powerline Communication network and its mathematical model. The channel Transfer function and Error Performance of Proposed powerline
communication System noise is evaluated with various digital modulation techniques Bit error rate (BER) and signal to noise ratio (SNR) curve by using simulation software. The results indicated that the noise analysis is effective for modelling the power line communication channel. Also, we have presented the various studies on the channel performance based on Orthogonal frequency-division Multiplexing (OFDM) systems for an efficient design of a Broadband Powerline Communication (BPLC) system.
Similar to Adaptive and resource-efficient rural area networks (20)
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Zilliz
Join us to introduce Milvus Lite, a vector database that can run on notebooks and laptops, share the same API with Milvus, and integrate with every popular GenAI framework. This webinar is perfect for developers seeking easy-to-use, well-integrated vector databases for their GenAI apps.
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Adaptive and resource-efficient rural area networks
1. Adaptive and Resource-Efficient
Rural Area Networks
Slides at: www.cs.bham.ac.uk/~pejovicv/cambridge
Veljko Pejovic
Research Fellow
University of Birmingham
2. Digital Divide
●
●
●
A division between those who do and those who do
not have access to and the capability to use modern
information and communication technologies (ICTs)
The digital divide is tightly connected with the living
standard, health care, economy, education, political
freedoms
Observed from different aspects: gender, age,
affluence
3. Digital Divide – A Broad View
Internet users per region
Source: ITU 2013
4. Digital Divide – Causes
Differences between regions that
impact ICT adoption:
●
●
●
●
Purchasing power – ICTs cost
Existing infrastructure – ICTs
need reliable power supply
Level of urbanization – ICTs are
designed for cities
Different cultures – the same ICTs
might not be suitable for all
societies
5. Digital Divide – Urbanisation Levels
100
80
60
40
20
0
Least dev.
UK
Zambia
OECD
South Korea
South Africa
Urbanisation level [%]
Source: World Bank
6. Digital Divide – Rural vs Urban
100
Rural
80
Urban
60
40
20
0
Belarus
Brazil
Egypt
S. Africa
S. Korea
Population that uses the Internet [%]
Source: ITU
US
8. Existing Problems
Technical
●
Poor signal propagation due to vast distances,
terrain configuration, vegetation
●
Wireless interference, especially in
the case of unlicensed solutions
●
Lack of reliable electrical energy supply
Socio-economic
●
Economic infeasibility of wide area coverage
●
Lack of locally relevant online content
●
Inability to engage a wider community into the network
●
Micro digital divides: castes, genders
9. Our view on why rural area
connectivity fails
In rural areas a unique set of
technical and social
challenges are obstacles to
Internet penetration.
The essence of the problem
lies in a general lack of
understanding of rural area
dwellers’ needs, and in the
development of
communication technologies
without consideration of
unique nuances of rural areas.
10. Holistic approach
Investigate existing solutions
identify obstacles and
true needs of our users
Develop technical solutions
with experts from target areas
11. Investigating Technical and Social
Challenges in Rural Areas
Analysis of existing rural wireless networks in Africa
(Macha, Zambia and Dwesa, South Africa):
Why Macha and Dwesa?
●
●
●
●
Real rural Africa
Community wireless networks
Different social settings
Strong collaboration links
through our partners
12. Investigating Technical and Social
Challenges in Rural Areas
Analysis of existing rural wireless networks in Africa
(Macha, Zambia and Dwesa, South Africa):
●
Lightweight traffic monitoring system:
–
–
●
Packet headers on the satellite
gateway
Squid proxy logs
Social surveys
–
Go beyond just anecdotal evidence - quantifiable
data
–
Examine Internet usage, legacy communication
practices, social aspects of computer networking,
quality of service issues
13. Investigating Technical and Social
Challenges – Key Findings
●
The location of Internet access (home/work/internet
café) impacts the type of applications used online:
–
●
There is a strong locality of interest:
–
●
Only at-home access allows full-fledged online
experience, including active OSN usage, content
generation; otherwise deliberate interaction model
The majority of voice-over-IP (VoIP) calls and instant
messages (IM) are exchanged within the village
Network performance and user behavior are tightly
intertwined:
–
people share files via USB drives when the network is
More about rural area network analysis in our WWW'11 paper
congested
14. Develop Technical Solutions
Guidelines:
●
Provide at-home Internet access to all
●
Support local communication
●
Facilitate content generation
●
Be resource (electrical energy, satellite bandwidth,
wireless spectrum) efficient
16. VillageNet
VillageCell
Enables free local
mobile phone calls via
off-the-shelf
Evolved into Kwiizya
open-source solutions.
Itdeployed no Macha, Zambia.
requires in modification
to the existing GSM
handsets and SIM cards.
Check: M. Zheleva et al.
●
●
●
"Kwiizya...", MobiSys'13
GNUradio
OpenBTS
Asterisk
17. VillageNet
VillageShare
Evolved into Kwaabana
Improves content generation
and sharingin Macha, Zambia
deployed in a village via
a local file sharing application.
and rural Eastern Cape
Enables extra upload capacity
Check: D. Johnson et al.
via time-delayed uploads.
"Kwaabana...", ACM DEV'13
19. Wide-Area Wireless
Low population density:
●
●
Cell phone towers are not economically viable
for low income under-populated areas
WiFi networks have a limited range and
require a line of sight
20. New opportunities for rural area
connectivity
White spaces:
●
●
●
Frequency band from roughly
50MHz to 800MHz
Vacant after TV went digital;
potentially unlicensed spectrum
Excellent propagation properties:
–
Long range (path loss ~ f2)
–
Not absorbed by vegetation
–
Signal can bend around obstacles
21. White Spaces – Issues
●
●
White spaces encompass a few hundreds of MHz of
spectrum
Dynamic range in white spaces:
Technology
fL (MHz)
fU (MHz)
D (dB)
802.11 (2.4GHz)
2412
2484
0.26
802.11 (5 GHz)
5170
5700
0.85
GSM 900
935
960
0.23
White spaces
43.25
797.25
25.31
22. White Spaces – Issues
●
●
White spaces encompass a few hundreds of MHz of
spectrum
Dynamic range in white spaces:
Results from a 3 km long outdoor link in South Africa
Signal strength can be
tens of dB different
across the band.
23. White Spaces – Issues
●
●
White spaces encompass a few hundreds of MHz of
spectrum
Dynamic range in white spaces:
Why is this a problem?
Performance across the frequency band
cannot be described
solely by the propagation theory
Antenna properties and the environment
determine signal strength at different channels
24. White Spaces – Channel Allocation
●
●
We have a limited pool of vacant white space
channels
Network capacity depends on the useful signal
strength and the interference (plus noise) strength
How to allocate wireless channels
to network nodes so that
the network capacity is maximized?
25. Conventional Network – Channel
Allocation
●
Signal strength is equal at all frequencies. Channels
allocation strives to minimize interference.
Access points with
associated clients
26. Conventional Network – Channel
Allocation
●
●
Signal strength is equal at all frequencies. Channels
allocation strives to minimize interference.
Graph coloring – assign colors (channels) so that no two
nodes that share a link in the interference graph are
assigned the same color.
Interference graph
among access points
27. Conventional Network – Channel
Allocation
●
●
Signal strength is equal at all frequencies. Channels
allocation strives to minimize interference.
Graph coloring – assign colors (channels) so that no two
nodes that share a link in the interference graph are
assigned the same color.
28. White Space Network – Channel
Allocation
●
In white spaces signal strength varies over channels,
moreover the variation may be different for different pairs
of nodes.
29. White Space Network – Channel
Allocation
●
●
In white spaces signal strength varies over channels,
moreover the variation may be different for different pairs
of nodes.
Minimizing interference with graph coloring does not work
anymore. The graph depends on channel selection.
30. White Space Network – Channel
Allocation
●
●
In white spaces signal strength varies over channels,
moreover the variation may be different for different pairs
of nodes.
Minimizing interference with graph coloring does not work
anymore. The graph depends on channel selection.
31. White Space Network – Channel
Allocation
Propagation diversity over a wide white space band
is highly varying and unpredictable
Even if we were to know propagation
over all frequencies for all links,
the problem would be intractable
32. Channel Probing and Medium
Access
●
●
Consider a network of base stations (BSs) with multiple
associated clients (CPEs)
BSs select their operating channels and CPS switch to a
channel selected by the BS they are associated with
●
CPE
BS
Selection of the operating channel
impacts the signal strength from a
BS to a CPE and the interference
from one BS to another.
CPE
CPE
CPE
BS
CPE
33. Channel Probing and Medium
Access
●
●
We extend the 802.22 protocol with inter-BS and BS-CPE
probing.
A probe is a packet whose content is known to the
receiver. By comparing the received probe with the sent
one, we can estimate the channel quality. A probe is sent
at each available channel.
●
CPE
BS
CPE
After the probing is completed each
BS knows channel quality between
itself and each of its CPEs and the
interference level between itself and
each of the neighboring Bss.
BS
●
The information is also propagated
to the neighboring BSs.
34. White Space Network – Channel
Allocation
Propagation diversity over a wide white space band
is highly varying and unpredictable
Even if we were to know propagation
over all frequencies for all links,
the problem would be intractable
35. Channel Allocation Method
●
●
●
Gibbs sampling – obtain samples from a hard-to-sample
multivariate distribution
Draws samples from a multivariate
probability distribution: p( x1,..., x N )
Sample each of the variables (xi) in turn from a
j
j
j
j
conditional probability distribution: p( x i | x1 ,..., x i−1 , x i +1,..., x N )
Do this for each sample j = 1..k
●
In the end we have k samples from the joint distribution
How is Gibbs sampling
connected with
channel allocation?
36. Channel Allocation Method
1) Probability distribution is related to overall network
performance
2) Probability distribution depends on channels allocated
to BSs
3) Probability distribution favors states that lead to
maximum performance
4) Conditional probability distribution isolates the impact
of each of the nodes on the total optimization function
5) Conditional probability distribution can be calculated
independently at each of the base stations
If the above conditions hold,
Gibbs sampling of the performance distribution
(over channels at different BSs)
will lead to the optimal channel allocation
37. Channel Allocation Method
●
Network performance metric:
–
Total network capacity C, under a certain channel
allocation c independently at each of the base
stations: C(c) = C (c ) = W log(1+ SINR (c ))
∑
i
i
∑
i
i
i
Sum of the capacity of
each BS-CPE
●
SINR (signal to interference-plus-noise ratio)
is different at different channels
for different BS-CPEs due to high variability of
propagation in white spaces
Remember one of the conditions to use Gibbs sampling:
Conditional probability distribution isolates the impact of
each of the nodes on the total optimization function
SINR: a single BSs decision on the operating channel
affects interference at other BSs, yet we cannot isolate
the effect as it is “hidden” behind a log function
●
38. Channel Allocation Method
●
Network performance metric, take two:
–
Cumulative interference-plus-noise to signal
ratio (CINSR):
Noise Interference
CINSR(c) = ∑
i
1
=∑
SINRi (c i )
i
N 0W + ∑ ch(i, j)PH ji (c i )
j ≠i
PHi (c i )
Useful signal
ch(i,j) is 1 if BS i and BS j
operate on the same channel
39. Channel Allocation Method
●
Network performance metric, take two:
–
Cumulative interference-plus-noise to signal
ratio (CINSR)
●
Easy to isolate the impact of a single decision on
the total metric
PH (c ) PH (c )
N 0W
ji
i
ij
i
CINSRi (c) =
+ ∑ ch(i, j)
+
PH (c ) PH (c )
PHi (c i ) j ≠i
i
i
j
i
Impact of a local
decision on own
CINSR
Impact of a local
decision on others
CINSR
All the information can be calculated locally!
40. Channel Allocation Method
●
Connect the network performance metric with a
probability distribution:
–
The Gibbs distribution:
π (c) =
Favors low CINSR states
especially at a low temperature (T)
–
e
CINSR (c )
T
∑e
−
CINSR ( c ′ )
T
c ′ ∈c N
Local Gibbs distribution:
π i (c) =
−
e
−
CINSR i (c i ,(c j ) j ≠i )
∑e
c ′ ∈c N
T
−
CINSR i (c i ,(c j ) j ≠i )
T
41. Channel Allocation Method
●
Connect the network performance metric with a
probability distribution:
–
The Gibbs distribution:
π (c) =
Favors low CINSR states
especially at a low temperature (T)
–
e
CINSR (c )
T
∑e
−
CINSR ( c ′ )
T
c ′ ∈c N
Local Gibbs distribution:
π i (c) =
−
e
−
CINSR i (c i ,(c j ) j ≠i )
∑e
c ′ ∈c N
T
−
CINSR i (c i ,(c j ) j ≠i )
T
42. Channel Allocation Method
●
Each BS samples its local Gibbs distribution to obtain a
preferred channel selection
2
1
3
4
Available channels:
43. Channel Allocation Method
●
Each BS samples its local Gibbs distribution to obtain a
preferred channel selection
2
1
3
4
Available channels:
44. Channel Allocation Method
●
Each BS samples its local Gibbs distribution to obtain a
preferred channel selection
2
1
3
4
Available channels:
45. Channel Allocation Method
●
Each BS samples its local Gibbs distribution to obtain a
preferred channel selection
2
1
3
4
Available channels:
46. Channel Allocation Method
●
Each BS samples its local Gibbs distribution to obtain a
preferred channel selection
2
1
3
4
Available channels:
47. Channel Allocation Method
●
Each BS samples its local Gibbs distribution to obtain a
preferred channel selection
2
1
3
4
Available channels:
48. Channel Allocation Method
●
Each BS samples its local Gibbs distribution to obtain a
preferred channel selection
2
1
Is this channel allocation
optimal?
Available channels:
3
4
49. Channel Allocation Method
●
●
●
●
The distribution might be such that many states have low
energy, and the sampler might get stuck in a channel
selection which is good, but not optimal
Annealed sampler – change the temperature (T) as the
process progresses allows the exploration of a wider
solution space:
Depending on the temperature change schedule we get
different results
Inspiration from annealing
in metallurgy
50. VillageLink Algorithm
●
Distributed channel allocation algorithm (at each node):
–
While time t < tend
●
Calculate temperature T at time t (temperature
decreases over time)
●
Calculate local CINSRi for each possible channel decision
●
Calculate and sample local Gibbs distribution
●
●
–
π i (c)
Pick a channel according to the channel sampled from
the Gibbs distribution and disseminate that information
to neighbors
Listen to information about the channel selection of
neighbors
Switch the wireless interface to the last selected channel
Channel switching does not occur in the loop!
51. VillageLink Algorithm
●
Properties of the algorithm
–
Distributed algorithm - uses only local computations.
–
Uses propagation profiling results from channel probing.
–
Only the information on the channel that resulted from the
sampling process is used in each iteration. True channel
switching happens only once at the end of the process.
–
For certain cooling schedules converges towards the
globally minimal CINSR. However, there is no guarantee on
the number of iterations needed.
52. VillageLink – Evaluation
●
Simulation setup
–
Propagation in white spaces is influenced by the free space
loss, antenna patterns and the environment
●
●
Propagation calculation takes into account transmission
power, antenna gain and the distance between the
nodes
We closely model antenna irradiation patterns, frequency
selectivity and antenna orientation
–
We experiment with a varying number of base stations and
available channels
–
We model a wide area with a few TV stations that create
varying spectrum availability over the area
53. VillageLink – Evaluation
●
Is CINSR a good metric?
–
Comparison to the minimal interference metric
Over-provisioned channels
a lot of vacant channels, few BSs
Channel allocation in a rural network
is important even when
interference is not a problem
Under provisioned channels
a lot of BSs, few channels
Minimizing interference is
a good approach if the interference
limits the capacity
54. VillageLink – Evaluation
●
Alternatives to VillageLink
–
Least congested channel search (LCCS) – selects the
least used channel locally
–
Preferred intra-cell channel allocation (PICA) – selects
the channel for which the BS experiences the highest
channel gain towards its clients
–
VillageLink minimizes CINSR (cumulative interference
plus noise to signal ratio), thus taking into account
both preferred channels and interference
56. VillageLink – Evaluation
●
Fairness (Jain fairness index,
the closer the value is to 1 the better)
Ten available channels
Fifteen available channels
Twenty available channels
57. VillageLink – Conclusion
●
●
●
White space channel
allocation algorithm that
jointly minimizes interference
and maximizes BS-CPE
capacity
A practical solution that
requires the minimal number
of channel switching events
VillageLink is an integral part
of VillageNet, a set of
networking solutions we
developed for rural areas that
includes our previous work
VillageCell and VillageShare
58. VillageLink – Future
●
System Implementation
–
●
Deployment
–
●
From simulator to Software Defined Radio
Use case for VillageLink
Licensing
–
White spaces are still a grey zone when it comes to
licensing, especially in our target areas
59. Collaborators
Mariya Zheleva, UCSB
Albert Lysko, CSIR,
South Africa
David Johnson, CSIR, South Africa
Elizabeth Belding, UCSB
Gertjan van Stam, SIRDC,
Zimbabwe
Also:
● Meraka Institute, South
Africa
● LinkNet, Macha, Zambia
61. Digital Divide – Rethinking the
definition
●
A gap between those who
do and those who do not
have access to ICTs
62. Digital Divide – Rethinking the
definition
●
A variety of inequalities among people’s access to
ICTs, ability to use ICTs and benefits from using ICTs.
64. Measuring Success
●
A complex metric is necessary
–
Conventional metrics of access do not capture
differences in access quality
65. Measuring Success
●
Example – Connectivity Speed
Source: ITU
International Internet bandwidth (bit/s per user), by region
66. Measuring Success
●
Example – Connectivity
The average web page size grew
Speed about 50 times in 15 years
Source: ITU
International Internet bandwidth by region
Is the access in the developing world
effectively getting worse?
68. Measuring Success
●
Example – Location of Access
–
Location of access is important:
●
Distance:
At home or a long walk to a terminal
Availability hours:
–
●
Any time or business hours only
Pre-determining online behavior:
–
●
Browse the web or prepare emails before the
access happens
Types of applications used:
–
●
–
Some applications are more suited for leisurely
at-home access - Facebook
70. Measuring Success
●
Cultural and socio-economic affordances of
connectivity:
–
Content in local languages
–
Availability of e-Government services
–
e-Commerce
–
Supporting infrastructure: roads, banking (credit
cards)
–
Social affordances: connectivity with local and global
population; online social networks; networked
individualism