The internet is considered to be the most advanced technology today and a gateway to modern communication and the sharing of information, products, services, and technology. Nowadays, users want to be able to access anywhere and anytime several services and applications, which is increasing data traffic and triggering a mobile data explosion. Iraq has major problems in increasing the growth and use of the internet and changing the standard method of communication. This is a big challenge, however, since there are several variables that characterize this phase of transformation. In this paper, the problems, vision, and solutions are presented in details. This study aims to clarify the factors of internet use in Iraq by the use of an acceptable approach and by suggesting new solutions for all the presented problems. This work also, clarify the expected traffic and the mechanism to transform the traffic between local ISP’s networks (AS) internet exchange points.
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...IJECEIAES
Recently, mobile devices are becoming the primary platforms for every user who always roam around and access the cloud computing applications. Mobile cloud computing (MCC) combines the both mobile and cloud computing, which provides optimal services to the mobile users. In next-generation mobile environments, mainly due to the huge number of mobile users in conjunction with the small cell size and their portable information‟s, the influence of mobility on the network performance is strengthened. In this paper, we propose an energy efficient mobility management in mobile cloud computing (E2M2MC2) system for 5G heterogeneous networks. The proposed E2M2MC2 system use elective repeat multi-objective optimization (ERMO2) algorithm to determine the best clouds based on the selection metrics are delay, jitter, bit error rate (BER), packet loss, communication cost, response time, and network load. ERMO2 algorithm provides energy efficient management of user mobility as well as network resources. The simulation results shows that the proposed E2M2MC2 system helps in minimizing delay, packet loss rate and energy consumption in a heterogeneous network.
The internet is considered to be the most advanced technology today and a gateway to modern communication and the sharing of information, products, services, and technology. Nowadays, users want to be able to access anywhere and anytime several services and applications, which is increasing data traffic and triggering a mobile data explosion. Iraq has major problems in increasing the growth and use of the internet and changing the standard method of communication. This is a big challenge, however, since there are several variables that characterize this phase of transformation. In this paper, the problems, vision, and solutions are presented in details. This study aims to clarify the factors of internet use in Iraq by the use of an acceptable approach and by suggesting new solutions for all the presented problems. This work also, clarify the expected traffic and the mechanism to transform the traffic between local ISP’s networks (AS) internet exchange points.
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...IJECEIAES
Recently, mobile devices are becoming the primary platforms for every user who always roam around and access the cloud computing applications. Mobile cloud computing (MCC) combines the both mobile and cloud computing, which provides optimal services to the mobile users. In next-generation mobile environments, mainly due to the huge number of mobile users in conjunction with the small cell size and their portable information‟s, the influence of mobility on the network performance is strengthened. In this paper, we propose an energy efficient mobility management in mobile cloud computing (E2M2MC2) system for 5G heterogeneous networks. The proposed E2M2MC2 system use elective repeat multi-objective optimization (ERMO2) algorithm to determine the best clouds based on the selection metrics are delay, jitter, bit error rate (BER), packet loss, communication cost, response time, and network load. ERMO2 algorithm provides energy efficient management of user mobility as well as network resources. The simulation results shows that the proposed E2M2MC2 system helps in minimizing delay, packet loss rate and energy consumption in a heterogeneous network.
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous SystemsIJASRD Journal
The fast growing mobile data traffic causes the deficiency of cellular network capacity. To mitigate this problem, Wi-Fi offloading techniques where the mobile data traffic is offloaded through sparsely deployed Wi-Fi networks have been extensively investigated. Wi-Fi offloading techniques can be classified into: 1) auction game-based offloading and 2) congestion game-based offloading. To proposed system inventing a Finite Horizon Markov Decision Process (FHMDP) to make offloading decisions efficiently. The existing approach use two algorithms such as; 1) Hybrid offloading algorithm and 2) Monotone offloading algorithm. But the previous work of hybrid offloading algorithm and monotone offloading algorithm was not efficient. Based on the Finite Horizon Markov Decision Process (FHMDP) mechanism. The proposed mechanism of offload cellular network traffic of vehicular users through carrier Wi-Fi networks based on the game theory approach. It computes the mobile network offloading performance. In this design of offloading mechanism in order to improve the overall offloading performance. By reducing the number of vehicular users contending for the channel and prioritizing high WIFI data rates and thus the offloading performance can be improved. In the proposed approach is reducing the accessing cost, time and improve the Wi-Fi offloading performance.
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...IJERD Editor
The development of cloud computing and mobility,mobile cloud computing has emerged and
become a focus of research. By the means of on-demand self-service and extendibility, it can offer the
infrastructure, platform, and software services in a cloud to mobile users through the mobile network. Security
and privacy are the key issues for mobile cloud computing applications, and still face some enormous
challenges. In order to facilitate this emerging domain, we firstly in brief review the advantages and system
model of mobile cloud computing, and then pay attention to the security and privacy in the mobile cloud
computing. MCC provides a platform where mobile users make use of cloud services on mobile devices. The
use of MCC minimizes the performance, compatibility, and lack of resources issues in mobile computing
environment. By deeply analyzing the security and privacy issues from three aspects: mobile terminal, mobile
network and cloud, we give the current security and privacy approaches. The users of MCC are still below
expectations because of the associated risks in terms of security and privacy. These risks are playing important
role by preventing the organizations to adopt MCC environment. Significant amount of research is in progress in
order to reduce the security concerns but still a lot work has to be done to produce a security prone MCC
environment. This paper presents a comprehensive literature review of MCC and its security issues,challenges
and possible solutions for the security issues.
Smart automatic petrol pump system based on internet of things IJECEIAES
IoT is that a rapid expanding program presently for blend all equipment things like (sensors, gadgets, hardware and so on) assemble and embed those with programming creating our own gadgets use The petroleum pump is these days running physically. It's an activity that fundamentally a drawnout time and requires more workforce. Additionally, put fuel stations in away zones is extermely costly. So achievement an automatic fuel filling system using web technology to solve these problems. There are dense proposed systems which goal to improve the fueling operation so as to form it less difficulty and more dependabl and more-safe, guarinte that the purchaser gets the same quantity of fuel in interchange for what he/she pays, so assist to end fraud at different fuel stations. These systems take human-software interaction by the web-enabeled procedure, thus keep off all errors made by people. The fundamental objective of this review paper is to survey of recent projects in design protype of smart petro pump based on RFID as payment tool and control on it remotely with high security level and concluded with future potential direction in design of smart petrol pump system.
ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...ijma
Internet of Things applications such as environmental monitoring and healthcare may involve multimedia
communications from IoT devices to humans for decision-making. Therefore, the quality of delivered
multimedia should be in good perceived quality. Higher video quality results into higher energy consumptions due to encoding and decoding processes and as a result, will affect the performance of IoT devices due to their inherent energy constraints. This paper presents the impact of video encoding
parameters as non-network parameters on the energy consumption of IoT devices. The experimental results from Cooja simulator show that the videos with high bitrates and low frame rates consume more power than videos with low bitrates and high frame rates. It was also found that video content type affects energy consumption. Finally, this paper proposes a power model that takes into account video parameters such as
bit rate, frame rate and content types. The proposed model can play a vital role in video quality adaptation in multimedia communication over IoT devices.
A review on orchestration distributed systems for IoT smart services in fog c...IJECEIAES
This paper provides a review of orchestration distributed systems for IoT smart services in fog computing. The cloud infrastructure alone cannot handle the flow of information with the abundance of data, devices and interactions. Thus, fog computing becomes a new paradigm to overcome the problem. One of the first challenges was to build the orchestration systems to activate the clouds and to execute tasks throughout the whole system that has to be considered to the situation in the large scale of geographical distance, heterogeneity and low latency to support the limitation of cloud computing. Some problems exist for orchestration distributed in fog computing are to fulfil with high reliability and low-delay requirements in the IoT applications system and to form a larger computer network like a fog network, at different geographic sites. This paper reviewed approximately 68 articles on orchestration distributed system for fog computing. The result shows the orchestration distribute system and some of the evaluation criteria for fog computing that have been compared in terms of Borg, Kubernetes, Swarm, Mesos, Aurora, heterogeneity, QoS management, scalability, mobility, federation, and interoperability. The significance of this study is to support the researcher in developing orchestration distributed systems for IoT smart services in fog computing focus on IR4.0 national agenda.
A Survey on the applications of IoT: an investigation into existing environme...TELKOMNIKA JOURNAL
In today’s digital environment, devices are able to interconnect and react to contextual data more than ever before: artificial intelligence is beginning to coordinate how data collected from sensors and de-vices within the network is analysed, and device ecosystems are replacing standalone devices to deliver solutions to the user. In this paper, the researcher explores current implementations of IoT that have led to positive outcomes for the user; but also, the challenges that remain in today’s applications. Moreover, ex-ploring these current barriers may be able to infer future applications capable of being deployed on a global scale
Architectural design of IoT-cloud computing integration platformTELKOMNIKA JOURNAL
An integration between the Internet of Things (IoT) and cloud computing can potentially leverage the
utilization of both sides. As the IoT based system is mostly composed by the interconnection of pervasive
and constrained devices, it can take a benefit of virtually unlimited resources of cloud entity i.e storage
and computation services to store and process its sensed data. On the other hand, the cloud computing
system may get benefit from IoT by broadening its reach to real world environment applications. In order
to incarnate this idea, a cloud software platform is needed to provide an integration layer between the IoT
and cloud computing taking into account the heterogenity of network communication protocols as well as the
security and data management issues. In this study, an architectural design of IoT-cloud platform for IoT and
cloud computing integration is presented. The proposed software platform can be decomposed into five main
components namely cloud-to-device interface, authentication, data management, and cloud-to-user interface
component. In general, the cloud-to-device interface acts as a data transmission endpoint between the whole
cloud platform system and its IoT devices counterpart. Before a session of data transmission established,
the communication interface contact the authentication component to make sure that the corresponding IoT
device is legitimate before it allowed for sending the sensor data to cloud environment. Notice that a valid IoT
device can be registered to the cloud system through web console component. The received sensor data
are then collected in data storage component. Any stored data can be further analyzed by data processing
component. User or any developed applications can then retrieve collected data, either raw or processed
data, through API data access and web console.
COMPARATIVE AND QOS PERFORMANCE ANALYSIS OF TERRESTRIAL-AERIAL PLATFORMS-SATE...IJCNCJournal
Wireless communications, nowadays, becomes a vital element of people’s daily life. Providing global connectivity in future communication systems via the heterogeneous network opens up many research topics to investigate potentialities, enabling technologies, and challenges from the perspective of the
integrated wireless systems. This paper aims to drive a comprehensive and comparative study on terrestrial-aerial platforms- satellite wireless communications systems, includes their characteristics and unravelling challenges. The comparison focuses on issues that reportedly can evaluate any wireless
systems for temporary events. These issues are altitude and coverage, Radio Frequency (RF) propagation, interference, handover, power supply constraints, deployment and maintenance challenges, reliability on special events or disaster relief, cost-effectiveness and environmental impact. Last, Quality of service (QoS) performance is analysed for the four wireless communication systems from the temporary events
perspective using the OPNET Modeller simulation tool. Results infer that space-based wireless systems outperform terrestrial ones.
UNIT I -WIRELESS COMMUNICATION FUNDAMENTALS
UNIT II -TELECOMMUNICATION NETWORKS & WIRLESS LAN
UNIT III -MOBILE NETWORK LAYER & TRANSPORT LAYER
UNIT IV- APPLICATION LAYER
UNIT V- DATABASE ISSUES
RF Planning and Optimization in GSM and UMTS NetworksApurv Agrawal
The report covers various aspects involved in improving the network coverage as well as the parameters used in planning of new network sites for GSM and UMTS networks.
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous SystemsIJASRD Journal
The fast growing mobile data traffic causes the deficiency of cellular network capacity. To mitigate this problem, Wi-Fi offloading techniques where the mobile data traffic is offloaded through sparsely deployed Wi-Fi networks have been extensively investigated. Wi-Fi offloading techniques can be classified into: 1) auction game-based offloading and 2) congestion game-based offloading. To proposed system inventing a Finite Horizon Markov Decision Process (FHMDP) to make offloading decisions efficiently. The existing approach use two algorithms such as; 1) Hybrid offloading algorithm and 2) Monotone offloading algorithm. But the previous work of hybrid offloading algorithm and monotone offloading algorithm was not efficient. Based on the Finite Horizon Markov Decision Process (FHMDP) mechanism. The proposed mechanism of offload cellular network traffic of vehicular users through carrier Wi-Fi networks based on the game theory approach. It computes the mobile network offloading performance. In this design of offloading mechanism in order to improve the overall offloading performance. By reducing the number of vehicular users contending for the channel and prioritizing high WIFI data rates and thus the offloading performance can be improved. In the proposed approach is reducing the accessing cost, time and improve the Wi-Fi offloading performance.
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...IJERD Editor
The development of cloud computing and mobility,mobile cloud computing has emerged and
become a focus of research. By the means of on-demand self-service and extendibility, it can offer the
infrastructure, platform, and software services in a cloud to mobile users through the mobile network. Security
and privacy are the key issues for mobile cloud computing applications, and still face some enormous
challenges. In order to facilitate this emerging domain, we firstly in brief review the advantages and system
model of mobile cloud computing, and then pay attention to the security and privacy in the mobile cloud
computing. MCC provides a platform where mobile users make use of cloud services on mobile devices. The
use of MCC minimizes the performance, compatibility, and lack of resources issues in mobile computing
environment. By deeply analyzing the security and privacy issues from three aspects: mobile terminal, mobile
network and cloud, we give the current security and privacy approaches. The users of MCC are still below
expectations because of the associated risks in terms of security and privacy. These risks are playing important
role by preventing the organizations to adopt MCC environment. Significant amount of research is in progress in
order to reduce the security concerns but still a lot work has to be done to produce a security prone MCC
environment. This paper presents a comprehensive literature review of MCC and its security issues,challenges
and possible solutions for the security issues.
Smart automatic petrol pump system based on internet of things IJECEIAES
IoT is that a rapid expanding program presently for blend all equipment things like (sensors, gadgets, hardware and so on) assemble and embed those with programming creating our own gadgets use The petroleum pump is these days running physically. It's an activity that fundamentally a drawnout time and requires more workforce. Additionally, put fuel stations in away zones is extermely costly. So achievement an automatic fuel filling system using web technology to solve these problems. There are dense proposed systems which goal to improve the fueling operation so as to form it less difficulty and more dependabl and more-safe, guarinte that the purchaser gets the same quantity of fuel in interchange for what he/she pays, so assist to end fraud at different fuel stations. These systems take human-software interaction by the web-enabeled procedure, thus keep off all errors made by people. The fundamental objective of this review paper is to survey of recent projects in design protype of smart petro pump based on RFID as payment tool and control on it remotely with high security level and concluded with future potential direction in design of smart petrol pump system.
ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...ijma
Internet of Things applications such as environmental monitoring and healthcare may involve multimedia
communications from IoT devices to humans for decision-making. Therefore, the quality of delivered
multimedia should be in good perceived quality. Higher video quality results into higher energy consumptions due to encoding and decoding processes and as a result, will affect the performance of IoT devices due to their inherent energy constraints. This paper presents the impact of video encoding
parameters as non-network parameters on the energy consumption of IoT devices. The experimental results from Cooja simulator show that the videos with high bitrates and low frame rates consume more power than videos with low bitrates and high frame rates. It was also found that video content type affects energy consumption. Finally, this paper proposes a power model that takes into account video parameters such as
bit rate, frame rate and content types. The proposed model can play a vital role in video quality adaptation in multimedia communication over IoT devices.
A review on orchestration distributed systems for IoT smart services in fog c...IJECEIAES
This paper provides a review of orchestration distributed systems for IoT smart services in fog computing. The cloud infrastructure alone cannot handle the flow of information with the abundance of data, devices and interactions. Thus, fog computing becomes a new paradigm to overcome the problem. One of the first challenges was to build the orchestration systems to activate the clouds and to execute tasks throughout the whole system that has to be considered to the situation in the large scale of geographical distance, heterogeneity and low latency to support the limitation of cloud computing. Some problems exist for orchestration distributed in fog computing are to fulfil with high reliability and low-delay requirements in the IoT applications system and to form a larger computer network like a fog network, at different geographic sites. This paper reviewed approximately 68 articles on orchestration distributed system for fog computing. The result shows the orchestration distribute system and some of the evaluation criteria for fog computing that have been compared in terms of Borg, Kubernetes, Swarm, Mesos, Aurora, heterogeneity, QoS management, scalability, mobility, federation, and interoperability. The significance of this study is to support the researcher in developing orchestration distributed systems for IoT smart services in fog computing focus on IR4.0 national agenda.
A Survey on the applications of IoT: an investigation into existing environme...TELKOMNIKA JOURNAL
In today’s digital environment, devices are able to interconnect and react to contextual data more than ever before: artificial intelligence is beginning to coordinate how data collected from sensors and de-vices within the network is analysed, and device ecosystems are replacing standalone devices to deliver solutions to the user. In this paper, the researcher explores current implementations of IoT that have led to positive outcomes for the user; but also, the challenges that remain in today’s applications. Moreover, ex-ploring these current barriers may be able to infer future applications capable of being deployed on a global scale
Architectural design of IoT-cloud computing integration platformTELKOMNIKA JOURNAL
An integration between the Internet of Things (IoT) and cloud computing can potentially leverage the
utilization of both sides. As the IoT based system is mostly composed by the interconnection of pervasive
and constrained devices, it can take a benefit of virtually unlimited resources of cloud entity i.e storage
and computation services to store and process its sensed data. On the other hand, the cloud computing
system may get benefit from IoT by broadening its reach to real world environment applications. In order
to incarnate this idea, a cloud software platform is needed to provide an integration layer between the IoT
and cloud computing taking into account the heterogenity of network communication protocols as well as the
security and data management issues. In this study, an architectural design of IoT-cloud platform for IoT and
cloud computing integration is presented. The proposed software platform can be decomposed into five main
components namely cloud-to-device interface, authentication, data management, and cloud-to-user interface
component. In general, the cloud-to-device interface acts as a data transmission endpoint between the whole
cloud platform system and its IoT devices counterpart. Before a session of data transmission established,
the communication interface contact the authentication component to make sure that the corresponding IoT
device is legitimate before it allowed for sending the sensor data to cloud environment. Notice that a valid IoT
device can be registered to the cloud system through web console component. The received sensor data
are then collected in data storage component. Any stored data can be further analyzed by data processing
component. User or any developed applications can then retrieve collected data, either raw or processed
data, through API data access and web console.
COMPARATIVE AND QOS PERFORMANCE ANALYSIS OF TERRESTRIAL-AERIAL PLATFORMS-SATE...IJCNCJournal
Wireless communications, nowadays, becomes a vital element of people’s daily life. Providing global connectivity in future communication systems via the heterogeneous network opens up many research topics to investigate potentialities, enabling technologies, and challenges from the perspective of the
integrated wireless systems. This paper aims to drive a comprehensive and comparative study on terrestrial-aerial platforms- satellite wireless communications systems, includes their characteristics and unravelling challenges. The comparison focuses on issues that reportedly can evaluate any wireless
systems for temporary events. These issues are altitude and coverage, Radio Frequency (RF) propagation, interference, handover, power supply constraints, deployment and maintenance challenges, reliability on special events or disaster relief, cost-effectiveness and environmental impact. Last, Quality of service (QoS) performance is analysed for the four wireless communication systems from the temporary events
perspective using the OPNET Modeller simulation tool. Results infer that space-based wireless systems outperform terrestrial ones.
UNIT I -WIRELESS COMMUNICATION FUNDAMENTALS
UNIT II -TELECOMMUNICATION NETWORKS & WIRLESS LAN
UNIT III -MOBILE NETWORK LAYER & TRANSPORT LAYER
UNIT IV- APPLICATION LAYER
UNIT V- DATABASE ISSUES
RF Planning and Optimization in GSM and UMTS NetworksApurv Agrawal
The report covers various aspects involved in improving the network coverage as well as the parameters used in planning of new network sites for GSM and UMTS networks.
Wireless network implementation is a viable option for building network infrastructure in rural
communities. Rural people lack network infrastructures for information services and socio-economic
development. The aim of this study was to develop a wireless network infrastructure architecture for
network services to rural dwellers. A user-centered approach was applied in the study and a wireless
network infrastructure was designed and deployed to cover five rural locations. Data was collected and
analyzed to assess the performance of the network facilities. The results shows that the system had been
performing adequately without any downtime with an average of 200 users per month and the quality of
service has remained high. The transmit/receive rate of 300Mbps was thrice as fast as the normal Ethernet
transmit/receive specification with an average throughput of 1 Mbps. The multiple output/multiple input
(MIMO) point-to-multipoint network design increased the network throughput and the quality of service
experienced by the users.
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIESijcsit
Wireless network implementation is a viable option for building network infrastructure in rural communities. Rural people lack network infrastructures for information services and socio-economic development. The aim of this study was to develop a wireless network infrastructure architecture for network services to rural dwellers. A user-centered approach was applied in the study and a wireless network infrastructure was designed and deployed to cover five rural locations. Data was collected and
analyzed to assess the performance of the network facilities. The results shows that the system had been performing adequately without any downtime with an average of 200 users per month and the quality of service has remained high. The transmit/receive rate of 300Mbps was thrice as fast as the normal Ethernet transmit/receive specification with an average throughput of 1 Mbps. The multiple output/multiple input
(MIMO) point-to-multipoint network design increased the network throughput and the quality of service experienced by the users.
Most universities are already implementing wired and wireless network that is used to access integrated information systems and the Internet. At present, it is important to do research on the influence of the broadcasting system through the access point for video transmitter learning in the university area. At every university computer network through the access point must also use the cable in its implementation. These networks require cables that will connect and transmit data from one computer to another computer. While wireless networks of computers connected through radio waves. This research will be a test or assessment of how the influence of the network using the WLAN access point for video broadcasting means learning from the server to the client. Instructional video broadcasting from the server to the client via the access point will be used for video broadcasting means of learning. This study aims to understand how to build a wireless network by using an access point. It also builds a computer server as instructional videos, supporting software that can be used for video server that will be emitted by broadcasting via the access point and establish a system of transmitting video from the server to the client via the access point.
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009Journal For Research
DakNet, is an ad hoc network and an internet service planted on the applied science, which uses wireless technology to provide an asynchronous digital connectivity, it is the intermediate of wireless and asynchronous service that is the beginning of a technical way to universal broadband connectivity. The major process is it provides the broadband connectivity as wider. This paper broadly describes about the technology, architecture behind and its working principles.
Internet Access Using Ethernet over PDH Technology for Remote AreaRadita Apriana
There was still is gap among people living in city and in remote area to get information access,
especially who lived in the Eastern part of Indonesia. People living in such remote area usually were
isolated from town by natural condition like rivers, valleys, hills and so on. Therefore, telecommunication
infrastructure for remote area using cooper was not effective and efficient way to build. The issue was how
information and communication technology could penetrate such areas. This research aimed to propose
technology that could be implemented to overcome the difficulties. Ethernet over Plesiochronous Digital
Hierarchy (EoPDH) was one of many techniques that provided Ethernet connectivity over non-Ethernet
networks. EoPDH was a standardized methodology for transporting native Ethernet frames over the
existing established PDH transport technology. To provide last milefor the local people, use of Mesh
Wireless Local Area Network was made and connected to internet gateway via Ethernet over PDH based
microwave radio link. The test showed that The Ethernet frames were successfully transported to remote
area with good quality of service such as throughput, response time, and transaction rate.
Traffic Offloading Solutions: Femto, WiFi and Integrated Femto-WiFiShristi Pradhan
I provide a comprehensive overview on various traffic offloading solutions:
1. Femtocells, which provides the benefits of scalability, automatic configuration and self-optimization.
2. WiFi, widely available in homes and hotspots.
3. Integrating femto and WiFi together to reap the benefits of both femtocell and WiFi technology.
Current Trends in Networking (Assignment)Gochi Ugo
This paper is the answer to the assessment questions of the Current Trends In Networking module of BSc. Computing (Information Management) of Anglia Ruskin University
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A New Data Offloading Framework Between Mobile Network and Campusijsrd.com
Data offloading is a technique to transfer data between different networks like mobile network to WiFi networks. WiFi or Wi-Max networks are very fast and require no spectrum fees to implement them. Whereas Mobile networks require the spectrum reservations which are highly costly and heavily affect the service charges offered by the cellular service providers. In our proposed scenario, we are using controlled data transfer mechanism to offload data between mobile network and campus wireless network to facilitate the calling facility in the campus for the smart-phone users using Wireless network in the campus.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Climate Impact of Software Testing at Nordic Testing Days
Experience in the implementation of wi fi community solution for rural in kiulu, sabah
1. 1
Abstract--The implementation of communication technology and
infrastructure has it challenges especially in the rural area when
there are issues that needs exploration such as the basic
infrastructure, size of coverage and the right application to suit
the local flavor in order to bridge the digital divide plus
mitigating the gap between urban and rural in terms of internet
literacy. The project in Kiulu, Sabah presents our involvement
in planning, wireless infrastructure design, site survey,
interaction with local authorities and communities, site
preparation and implementation, operations and management
of community based communications solution. There was no
internet access in this area prior to this project therefore this
effort receive overwhelming support from the public. The
contribution of this exercise includes the sharing of deployment
experience together with the successful execution of a locally
developed high tech radio in mesh and point to point topology.
Moreover, the chosen sites and the ‘purpose-built’ mobile
application enhanced the objective to connect the Kiulu societies
around the health clinic, community hall, schools, police station,
mosque, and church and recreation area via free Wi-Fi internet
services.
Index Term: Community WiFi, WiFi Mesh rural area,
Solution WiFi rural area.
1 INTRODUCTION
It has been an initiative by the Malaysian government to
increase the internet access reach to the rural areas and during
the 10th
Malaysia plan, amongst others, 5,737 villages [1]
were connected under the Kampung Tanpa Wayar (KTW)
programme using allocation from our regulator, Malaysian
Communications and Multimedia Commission (MCMC).
The KTW basically consist of a single node Wi-Fi device that
normally covers a limited area near an Internet Center room
or building. This is also known as ‘Hotspot’ where users will
‘assemble’ around to browse the internet and within certain
hours, some may involve in activities which utilizes desktop
application such as web hosting, social media, on-line
business, etc..
Here, we are more interested to explore into ‘Community
Network’ where we create a ‘linked’ system solution
consisting of a number of Mesh Wi-Fi radios situated at a pre-
selected places such as school, municipal office, pole station,
clinic, place of worship and public area. In doing this, we
expect to get the community to communicate with each other
utilizing state of the art communication facilities and share
beneficial information.
1
Internet User Survey 2016
https://www.mcmc.gov.my/skmmgovmy/media/General/pdf/IUS2016.pdf
Communities of the future have to be organic, flexible and
versatile. As society and aspirations alter over time, the
community has to adapt to change. A new paradigm of
community development and planning has arisen from the
actual wave of globalization, emerging technologies and the
collective intelligence of the web.
This paper present a government funded project in Kiulu,
Sabah, Malaysia in which MIMOS, a national RND
organization will provide a wireless solution using IEEE
802.11 wireless technology [2]. It is in-line with the call by
our Ministry of Science, Technology and Innovation
(MOSTI) now known as Ministry of Science, Technology,
Environment and Climate Change (MESTECC) to ‘bridge the
digital divide’ and reduce the “access gap” especially in the
rural area1
.
One of the initiative taken was to address this concern by
providing free internet access to the village folks in order to
assist them adopt the new initiative. In this project, a 3 year
provision was allocated to run the services using the provided
grant before the local municipal decide to continue on the 4th
year onwards.
In this project, a locally produced Wi-Fi Mesh our own
homegrown product codename Mi-MESA that stands for
MIMOS Gigabit Enhanced Mesh System. This is a multi-
radio mesh wireless broadband device capable as both
backhaul and radio access Wi-Fi system. It is then integrated
with other relevant communication devices plus relevant
infrastructures such as solar system, mid-hinge poles and
other accessories.
The deployment experience is describe within the key
features in the capacity of 1- Network Design and Planning,
2- Mesh Protocol, 3- Network Management, 4-
Infrastructure, 5- Application. Main system components shall
be discussed in detail to further impart the knowledge and
experience gathered during the exercise. Apart from sharing
the journey towards this solution implementation, most
importantly is to pledge the creation of community based
internet centers instead of hotspots in order to accelerate the
growth of technology spread and to reduce ‘digital literacy’
[3].
2 NETWORK DESIGN AND PLANNING
Network planning and design is an essential process in any
telecommunication network deployment. This process is an
iterative procedure which related to topography, budgetary,
operations and maintenance [4] [5][6][7]. This to ensure the
direction of choosing the right technology align with user
Experience in the implementation of Wi-Fi
Community Solution for Rural in Kiulu, Sabah
Rosli Uzairi and Ir. Badrul Zaman Adnan
Research and Development MIMOS Berhad, Technology Park Malaysia 57000 Bukit Jalil Kuala Lumpur
Email: rosli.uzairi@mimos.my
2. 2
requirements.
2.1 Site survey
A comprehensive site survey is able to produce idea for
engineers to the next level. All the data collected during the
site survey will be affecting the network design.
For Kiulu site survey, the terrain contribute big challenge
for the engineers. The site cover with tropical rainforest and
hilly area.
Figure 1: Map of the deployment area, Kiulu [6]
Most of the housing area build next to the river, thus it’s
hard for the engineers during the designing stage [4][8][9].
During the site survey, each identified location been tested for
the network connectivity and Wi-Fi presence, 2.4GHz and 5
GHz [10]. One of the most important activity in site survey is
to scan presence of 2.4GHz and 5GHz for the planning of
radio frequency to avoid channel overlapping.
Table 1: Site survey result
Table 1 show that result of the site survey. The most important
data was the signal average RSSI. All the pole been align to
get the RSSI signal below -65. The lower RSSI the higher
transmit bit rate it will get. Some data might be lower due to
interference of 5GHz.
Average distance from one pole to another pole about 150m
to 200m. Several equipment required for this site survey
such as:
2.1.1 Portable Lightweight Pole
It required at least 2 lightweight pole for the network
connectivity testing at Kiulu. 10m pole was used during the
site survey.
Figure 2: Site survey pole 10m
2.1.2 Battery and Inverter
To power up the Mi-MESA device, we used 12v car
battery and inverter to convert DC to AC.
2.1.3 Antenna and Accessories
There is many type of antenna in the market and for this
site survey, 18dBi MIMO dual polarization panel antenna
from Lanbowan was selected. A bit high spec compare to the
distance between one location to another location but
challenge from the terrain and tropical forest easily
eliminated. A 1m RF cable been used to connect Mi-MESA
to the antenna.
2.2 Network Design
Network design will be turn out after site survey meet the
objective. At this stage, the network design not only referring
to the site visit outcome but also user requirement play
important role. Figure 3 show that network design for Kiulu,
Sabah.
Figure 3: Network Diagram, Kiulu Sabah
The above diagram illustrates the overall logical network
diagram that covers all the location as required by the users.
Most of the selected locations are very strategic which
normally a place for villagers gathering. Total number of Mi-
3. 3
MESA were 18 units [11]. The antenna combination of omni-
directional and directional depending on the location. Kg
Tombongan will be the furthest location that use 5GHz as a
backhaul communication.
Dewan Poturidong connect to the Mi-MESA gateway via
fiber provided by Celcom Timur Sdn Bhd [12]. The fiber
carry 2Mbps for the connection between Pekan Kiulu and
Poturidong which one of the tourist center. Each of the Mi-
MESA consist connected to IP camera, power up by solar
system, Wi-Fi coverage and internet. Data center located in
the Dewan Kiulu where the server for the applications,
firewall, router and ISP last mile residing here.
2.2.1 Mi-MESA Wireless Mesh [11]
Each of the Mi-MESA able to carry at least 50Mbps –
70Mbps, full duplex [11]. Since the terrain of Kiulu cover
with tropical rainforest and hilly area, most of the node
connected as relay design. Accept in the middle of town
where mesh redundancy apply.
2.2.2 CCTV [13]
The CCTV require 2mbps requirement if it run using HD
definition but if it set to full HD it require 5Mbps. The CCTV
support infrared for the night vision and up to 10m – 20m
night view.
2.2.3 MikroTik [14]
Refer to the user requirements and budgetary, multipurpose
appliance is the best solution. MikroTik able to provide
features such as router, interface between LAN and WAN.
Configured as DHCP server and internal routing VLAN. The
IP VPN connection connected from MIMOS Network
Operation Centre to Bandar Kiulu data center. The VPN
enable MIMOS NOC monitor 24/7 the status and healthy of
the network infrastructure of Kiulu. The appliance also been
configured to produce landing page.
2.2.4 Internet Management
To utilize internet backhaul pipe for the good purpose it
require internet management. Either the internet backhaul fast
or slow there is mechanism that can control the usage. We
installed 2Mbps for Kiulu internet backhaul. The appliance
eliminate unnecessary application and website [15].
2.2.5 Switch
For the LAN, basic enterprise switch 24 port + 2 SFP been
selected. The switch connected with router, server, Mi-MESA
gateway and another switch via fiber [16]. System
administrator may connected directly to the switch.
2.2.6 Antenna
2 types of antenna is used in Kiulu deployment 2.4GHz
divided into 2, directional [18] and omnidirectional antenna
[17]. Both with dBi gain of 15 and 10. The other 5GHz, 18dBi
directional was used.
Figure 4: 18dBi 5GHz, 15dBi & 10dBi 2.4GHz
2.2.7 Server
All the applications residing in the server. The server
comes from basic Proliant Gen 9 server.
2.3 IP Planning
Table 2: TCP/IP Table
Engineer develop IP document that show how the IP
addresses distributed among the device that support TCP/IP
protocol based on the network architecture. Having this kind
of process, it’s contribute to:
a. Ease future network expansion and modification
b. Easy maintenance
c. Estimate total number of user and device connected.
In Kiulu network we use segment B class of 172.17.10.x.
The netmask is 255.255.255.0 equivalent to 24 bit and the
wildcard 0.0.0.255. The number of useable is 254.
The default gateway located in the router and all the
routing running in the same device. The entire network,
sensor and non-user equipment using static IP. The rest for
user laptop, pc, smart phone and others using DHCP as define
in the router. The IP been lease for 5 days to keep unnecessary
interruption.
2.4 Coverage Planning
Despite the challenges faced in the design and
optimization of the wireless network due to the difficult
terrain and trees, the final coverage was quiet good with
4. 4
more than 80% of the coverage is well within -65 dBm as
depicted in figure 6. [20]
Figure 6 Community Wi-Fi coverage in Kiulu, Sabah
3 MESH PROTOCOL
Mimos is a national R&D center for Malaysia in ICT and
in Kiulu deployment, Mi-MESA wireless mesh protocol been
deployed as the telecommunication device. It is locally made
by MIMOS engineers.
Figure 7: Mi-MESA Mesh Protocol
Mi-MESA is a new generation of outdoor customer
premises equipment (CPE) [11]. It is a wireless mesh
appliance that allows for a cost-effective and flexible wireless
broadband infrastructure for broadband connectivity. It
comes with a sensor application system and value added
services to cater for the needs of network service providers
and end users [10].
Mi-MESA caters for multi-radio requirements based on
mesh features. It utilises 5 GHz Wi-Fi (802.11ac) technology
with a mesh network link backhaul for robustness and
redundancy.
4 NETWORK MANAGEMENT SYSTEM (NMS)
We believe the underpinnings of monitoring technique
follows the FCAPS concept which stands for Fault, Capacity,
Administration, Performance and Security. Upon the
completion of building any network infrastructure be it wired
or wireless, the need for monitoring is paramount.
In Kiulu, we utilized an NMS product that enables us to
monitor, analyze and store critical parameters on day-to-day
network performance both locally and remotely [21]. In the
case of this project, the network is being monitored from
Kuala Lumpur via a secured VPN connection. It is quite a
distance but we have chosen the right service provider that
can provide a guaranteed service availability of 99.9% for the
backbone transmission [12].
There are various types of network elements within the
network such as router, L2 switch, Mesh Wi-Fi Radio,
Internet Access Module, IoT sensors, CCTV and Solar Power
elements. Therefore, all monitoring uses the SNMP protocol
(SNMPv2 and SNMPv3) or simply ICMP for the ones
without compatible drivers.
Other features essential to the success of managing and
maintaining the network is the NMS apps for mobile to assist
preventive and corrective maintenance effort from anywhere
other than the HQ. In order to be complete, the ideal network
management hierarchy would be having Element
Management System (EMS) for each vendor specific devices
before the NMS but for a small sized network, we can use the
vendor specific web-based configurator or application like
Putty [22] to remotely configure the devices during
maintenance procedures.
On overall, the NMS helps us get real time situation of the
entire network health including the end user connectivity
either from the Network Operation Center (NOC) normally at
the HQ or via its mobile apps to help system troubleshooting
especially when it has to be done remotely.
5 INFRASTRUCTURE
The infrastructure was one of the important module
considered for Kiulu deployment. Robust infrastructure
contribute to public safety, accurate connectivity mesh,
performance and lasting.
Figure 8: 12m Hinge Pole
There are a lot type of pole in the market. Most of the
streetlight pole use traditional design where the lamp located
at the top of the pole and any maintenance require sky lift.
In this deployment, 12m hinge pole been used.
Surrounding with hilly area and rainforest, hinge pole is the
best design to suit the environment. Each of the pole has been
galvanized to prevent from rusting and it is 12m height to get
clear line of sight.
5. 5
As for the pole base, the ground been dig by 2 feet (long) x
2 feet (wide) x 3 feet (width). The size should fit for the
footing.
Figure 9: Pole Base
The footing require 1.5 feet (long) x 1.5 feet (wide) x 3 feet
(width) concrete. The J bolt mounting install in the concrete
mold. The screw on top of the concrete surface, connected to
the pole.
Figure 10: J Bolt & Footing
To power up the mesh device, CCTV and sensors at the
pole, solar system been used. Since most of the place located
at none electric facilities.
Figure 11: Solar System
The solar system provide 5 days capacity to give non-
stoppable services under ‘Khatulistiwa’ weather. The system
include controller, inverter, 2 x 150w solar panel and 100mAh
x 3 battery.
6 APPLICATIONS
During the earlier days of internet access, users depend on
search engines to visit their favorite sites or start their
application via their embedded icons within their mobile
phones. However, in the advent of destructive applications
and affordability of smart phones, internet experience
expands from messaging and browsing to instant chatting,
streaming video, music and movie downloads, reading e-
publication and playing computer games. Statistics shows that
users spent 18.8 hours online in a week, equivalent to 2.7
hours in a day [23].
In overall, activities includes entertainment, educational,
services, commercial activities, business and banking. (Refer
figure 12)
Figure 12: 2016 MCMC statistics on internet user activities
This project comes with a mobile apps feature (using
Android) that can be downloaded from a landing page once
user is within the ‘coverage area’. This apps allow users to
quickly adapt to a purpose built sites which have significance
to the Kiulu community that is famous for its eco-tourism
environment. However, the main intention is still to inculcate
sense of belonging, promote local product business via on-
line advertisement, self-security via crowd monitoring and
community voice communication and Internet of Things
(IoT) sensor on top of utilizing the other internet services
from the web.(Refer figure 13)
Figure 13: Mobile Apps made available for Kiulu folks
Some of the apps that is seen to be beneficial for
community use is the bulletin board where community heads
can broadcast important messages to everyone like a bulletin
6. 6
board, free VoIP calls within the user group, capability to
‘quick dial’ preset emergency contacts and receive alerts from
critical sensor such as water level as a preemptive measure
from disaster such as flood. Moreover, the CCTV views
allows ‘crowd sourced monitoring’ where the users can
together contribute in policing the areas 24 x 7. Continuing
effort is needed to further improvise these to get the ‘right’
formula in determining the ‘locally appealing’ mobile
application to boost the apps usage by all.
7 CONCLUSION
This initiative is envisioned as a building block approach
towards building smart communities from villages to districts,
states and hence the buildup towards the creation of a truly
digital nation.
The internet connection is vital and become necessity to
Kiulu’s residents which play a part in breaking down
communication barriers separated by distance and time. The
mobile application allow business transaction to transpire
without boundary far beyond that of their geographic place.
We believe that with the right type of services packaged with
the infrastructure support, rural communities shall gain the
benefit of information, communication and technology
offerings.
8 ACKNOWLEDGEMENT
We are thankful to our colleague Karambir Kaur Jasbir
Singh who provided expertise in the development of the
mobile apps.
9 REFERENCES
[1] TalentCorp, Eleventh Malaysia Plan 2016-2020
https://talentcorp.com.my/clients/TalentCorp_2016_7A6571
AE-D9D0-4175-B35D-
9EC514F2D24/contentms/img/publication/RMKe-
11%20Book.pdf
[2] IEEE 802.11 The working Group for Wireless LAN
http://grouper.ieee.org/groups/802/11/
[3] Digital Literacy and Digital Literacies
https://www.researchgate.net/publication/284918725
[4] Network Planning
https://en.wikipedia.org/wiki/Network_planning_and_design
[5] Experiences in using Wi-Fi for Rural Internet in India
http://home.iitk.ac.in/~chebrolu/docs/2007-exp-dgp.pdf
[6] Architecture For Rural A Wireless Network
Infrastructure Communities
http://aircconline.com/ijcsit/V9N3/9317ijcsit04.pdf
[7] A University’s Effort in Bridging Digital Divide among
Rural Community
http://journal.utem.edu.my/index.php/jtec/article/view/3845/
2760
[8] Enhanced broadband access as a solution to the social
and economic problems of the rural digital divide
https://journals.sagepub.com/doi/full/10.1177/02690942134
96974
[9] Providing Internet Access in Rural Areas
http://www.grc.upv.es/calafate/download/CR_paper_wisp.p
df
[10] Rural Wireless Mesh Network: A Design Methodology
https://www.scirp.org/journal/paperinformation.aspx?paperi
d=53084
[11] Mi-MESA Wireless Mesh
Protocolhttp://www.mimos.my/wp-
content/uploads/2014/12/Fact_Sheet-Mi-MESA-003-
1218A.pdf
[12] Internet Service Provider
http://www.ctsabah.com.my/ctsabah/
[13] CCTV
https://www.planet.com.tw/en/product/ica-3250-v3?c1=ip-
surveillance&c2=ip-camera&c3=h-265-ip-camera
[14] MikroTik
https://mikrotik.com/
[15] Internet Management
https://www.sangfor.com/product/sxf-network-security-
iam.html
[16] Switch
https://www.tp-link.com/my/business-networking/managed-
switch/
[17] Omni Directional Antenna (2.4GHz)
https://www.ui.com/airmax/airmax-omni-antenna/
[18] Directional Antenna (2.4GHz)
https://www.ui.com/airmax/airmax-sector-antenna/
[19] Server
https://h20195.www2.hpe.com/v2/getpdf.aspx/c04346247.p
df
[20] netAlly, Air Magnet Wi-Fi Analyzer and Survey PRO/
Planner
https://www.netally.com/products/airmagnet-wifi-analyzer/
[21] Solarwinds Network Monitoring
https://www.solarwinds.com/resources/whitepaper/monitori
ng-101
[22] PuTTY open source terminal emulator
https://www.putty.org/
[23] Malaysian Communications Multimedia Commission
https://www.mcmc.gov.my/about-us/annual-reports/annual-
reports