While the Internet is ubiquitous in most parts of the world today, the dominant network access technology is gradually shifting from wired to wireless connections. Notably, the ever increasing ...bandwidth, together with reduced latency in mobile networks, enables a multitude of new use cases for a wide range of industries. These new use cases have typically increased quality requirements for the wireless connection. Accordingly, the Internet architecture needs to keep pace with the recent developments, particularly in light of the holistic approach of the new fifth generation (5G) mobile communication standard. In this study, we shed light on the effects of 5G on the Internet's core, i.e., on the Internet interdomain traffic. The interdomain traffic between distinct autonomous systems (ASs) is exchanged by transit networks as well as through peerings at private network interconnects (PNIs) and public Internet Exchange Points (IXPs). 5G interdomain traffic estimation is especially important for IXPs as these are focal points that aggregate high traffic volumes. We coherently derive twelve 5G use case groups and present an overview of their individual associated 5G use cases. We characterize the communication networking (connection) requirements and the resulting implications of these use cases. Further, we develop and apply a methodology to assess the 5G use cases, so as to rank them in terms of their projected impact on the overall internet traffic growth. Based on this systematic approach, we conclude that the traffic for the use case groups Video in 5G, Health, and Virtual & Augmented Reality will have the largest impact. We identify a large number of other use case groups, e.g., Live Events, Tactile Internet, and Manufacturing, that will contribute rather small individual fractions to the overall growth of Internet traffic. However, their aggregated contribution to the internet traffic growth will be significant. Our traffic estimation can inform interdomain infrastructure providers, such as IXPs, and policy makers about the likely impact of the introduction of 5G on the interdomain traffic in the Internet.
•Based on important vertical industries, twelve 5G use case groups are identified.•Impact of 5G use case groups on Internet interdomain traffic is estimated.•Traffic is modeled based on traffic characteristics (number of nodes, bandwidth, and latency).•Impact model is based on traffic characteristics as well as computation and storage locations.•Video in 5G, Health, and Virtual & Augmented Reality have highest traffic impact.
Digital Dilemmas Venegas, Cristina
2010, 20100119, 2010-01-30, 20100101
eBook
The contentious debate in Cuba over Internet use and digital media primarily focuses on three issuesùmaximizing the potential for economic and cultural development, establishing stronger ties to the ...outside world, and changing the hierarchy of control. A growing number of users decry censorship and insist on personal freedom in accessing the web, while the centrally managed system benefits the government in circumventing U.S. sanctions against the country and in controlling what limited capacity exists.
Digital Dilemmasviews Cuba from the Soviet Union's demise to the present, to assess how conflicts over media access play out in their both liberating and repressive potential. Drawing on extensive scholarship and interviews, Cristina Venegas questions myths of how Internet use necessarily fosters global democracy and reveals the impact of new technologies on the country's governance and culture. She includes film in the context of broader media history, as well as artistic practices such as digital art and networks of diasporic communities connected by the Web. This book is a model for understanding the geopolitic location of power relations in the age of digital information sharing.
The emergence of the Industrial Internet of Things (IIoT) poses a large impact on established business models of manufacturing companies. This study aims at analyzing the influence of the IIoT on ...these business models from a business level perspective. In particular, it focuses on the interrelationships between business model component changes. While the sparse body of extant management literature examines just a subset of business model elements as affected by the IIoT, a framework comprising an entire set of elements is provided. Besides, their direct and indirect interrelationships, and the most important changes in each of the elements, are investigated. For this purpose, an exploratory multiple case study approach is employed, which is based on relevant IIoT-related experiences of 76 German manufacturing companies. By triangulating data from semi-structured expert interviews and archival company material, the study provides in-depth insights and a better understanding of IIoT-driven effects on manufacturing business models. It contributes to extant management literature by revealing the value proposition, internal infrastructure management, and customer relationships predominantly influenced by the IIoT. Moreover, it is shown that IIoT-triggered business model changes are offer-driven, particularly by production and process optimization within customers' production systems. These value proposition changes result in subsequent modifications of the remaining business model elements.
•Identification of business model elements taking on a key role in the IIoT.•Explanation of crucial IIoT-related business model changes.•Value proposition, internal infrastructure, and customer relations are mostly affected.•Business model changes are mainly offer-driven.•A framework of business model element interrelationships is provided.
The dramatic changes that occurred as a result of the developments in the digital age have left their mark on the format in which information reaches the consumer. The new media consumer has ...developed new skills in perceiving and processing information: he can easily use traditional media (television, radio, newspaper) and he can operate in the online networks as well. This paper presents some research results of various studies from the year 2014 and some theoretical aspects regarding the future of public relations and journalism in the Digital Age. Furthermore, the author of this article has conducted several interviews with PR practitioners, former journalists and with professors from two prestigious German universities, in order to determine some predictions and trends about and in the future of the two fields mentioned before.
The present paper aims to present the main findings of a quantitative and qualitative analysis on the suicides in Romania, as they are submitted in media and online news sites. The quantitative ...analysis provides information on the main factors associated with the increase of the suicides in Romania (gender, age, county, suicide methods, suicide causes and key motivations for suicide). The qualitative analysis, too, offers a classification and evaluation scheme for the essential characteristics of the suicide in Romania. There are set on this occasion some categories and subcategories such as: the victims numbers, the rational or irrational character of the suicide, its form of the expression (solitary or public suicide), the model followed (e.g. the mimetic suicide), the suicide methods, the suicide locations etc. The most important part of the paper is devoted to the classification of the causes, motivations and the main triggers of the suicide.
A edição de número 30 de Política & Sociedade é a primeira a ser publi-cada exclusivamente em versão eletrônica. Como demonstrado pelo expressi-vo número de consultas ao site do periódico, crescente ...mês a mês, a aposta no alcance e na praticidade do suporte on-line é inquestionável. Entre as princi-pais estratégias associadas a esta nova etapa do trabalho, já em marcha, estão a expansão das bases de indexação e o investimento na divulgação da revista por redes sociais.
Makalah ini membincangkan tentang penggunaan ketidaksantunan bahasa sebagai strategi pujukan emosi dalam iklan bercetak. Sebanyak 21 buah iklan bercetak berbahasa Sepanyol yang diambil daripada ...majalah, surat khabar dan juga internet telah dikaji dan dianalisis mengikut Model Ketidaksantunan (Culpeper, 1996). Hasil kajian mendapati dalam dunia pengiklanan moden, pengiklan tidak lagi bergantung kepada strategi kesantunan bahasa dalam merekacipta sesebuah iklan bagi tujuan menarik perhatian pembeli sasaran. Sebaliknya, strategi ketidaksantunan bahasa yang secara jelas boleh mengancam air muka seseorang juga diguna pakai secara meluas dalam iklan berbahasa Sepanyol. Hasil kajian mendapati strategi ketidaksantunan bahasa dalam iklan boleh menjadi daya penarik untuk mempengaruhi pelanggan sasaran dan menjadi pendorong bagi mencetuskan minat masyarakat untuk membeli barangan yang diiklankan. Strategi ketidaksantunan bahasa yang dapat dikenalpasti dalam iklan komersial adalah seperti menakut-nakutkan pembeli, mengugut secara langsung atau tidak langsung, menyindir serta memasukkan ujaran asertif berunsur negatif. Manakala bagi iklan sosial pula elemen ketidaksantunan yang dapat dikesan, antara lain adalah seperti penggunaan kata ganti nama yang tidak sesuai dan juga sindiran secara langsung.
Internet Industrial Control Systems (IICSs) that connect technological appliances and services with physical systems have become a new direction of research as they face different types of ...cyber-attacks that threaten their success in providing continuous services to organizations. Such threats cause firms to suffer financial and reputational losses and the stealing of important information. Although Network Intrusion Detection Systems (NIDSs) have been proposed to protect against them, they have the difficult task of collecting information for use in developing an intelligent NIDS which can proficiently detect existing and new attacks. In order to address this challenge, this paper proposes an anomaly detection technique for IICSs based on deep learning models that can learn and validate using information collected from TCP/IP packets. It includes a consecutive training process executed using a deep auto-encoder and deep feedforward neural network architecture which is evaluated using two well-known network datasets, namely, the NSL-KDD and UNSW-NB15. As the experimental results demonstrate that this technique can achieve a higher detection rate and lower false positive rate than eight recently developed techniques, it could be implemented in real IICS environments.
More than 40 percent of the world’s population has access to the internet, with new users coming online every day. Among the poorest 20 percent of households, nearly 7 out of 10 have a mobile phone. ...This report finds that traditional development challenges are preventing the digital revolution from fulfilling its transformative potential. For many people, today’s increase in access to digital technologies brings more choice and greater convenience. While this is great progress, many are still left out because they do not have access to digital technologies. To deliver universal digital access, one must invest in infrastructure and pursue reforms that bring greater competition to telecommunications markets, promote public-private partnerships, and yield effective regulation. The report concludes that the full benefits of the information and communications transformation will not be realized unless countries continue to improve their business climate, invest in people’s education and health, and promote good governance. The World Bank Group are already working with clients to promote competitive business environments, increase accountability, and upgrade education and skills-development systems to prepare people for the jobs of the future.
In recent years, significant attention has been directed toward the fifth generation of wireless broadband connectivity known as ‘5G’, currently being deployed by Mobile Network Operators. ...Surprisingly, there has been considerably less attention paid to ‘Wi-Fi 6’, the new IEEE 802.1ax standard in the family of Wireless Local Area Network technologies with features targeting private, edge-networks. This paper revisits the suitability of cellular and Wi-Fi in delivering high-speed wireless Internet connectivity. Both technologies aspire to deliver significantly enhanced performance, enabling each to deliver much faster wireless broadband connectivity, and provide further support for the Internet of Things and Machine-to-Machine communications, positioning the two technologies as technical substitutes in many usage scenarios. We conclude that both are likely to play important roles in the future, and simultaneously serve as competitors and complements. We anticipate that 5G will remain the preferred technology for wide-area coverage, while Wi-Fi 6 will remain the preferred technology for indoor use, thanks to its much lower deployment costs. However, the traditional boundaries that differentiated earlier generations of cellular and Wi-Fi are blurring. Proponents of one technology may argue for the benefits of their chosen technology displacing the other, requesting regulatory policies that would serve to tilt the marketplace in their favour. We believe such efforts need to be resisted, and that both technologies have important roles to play in the marketplace, based on the needs of heterogeneous use cases. Both technologies should contribute to achieving the goal of providing affordable, reliable, and ubiquitously available high-capacity wireless broadband connectivity.
•Evaluates 5G and Wi-Fi 6: The two main next generation wireless broadband technologies.•5G and Wi-Fi 6 are more complementary, than competitors.•Regulatory policies that favour one technology over another need to be resisted.•Cellular will remain the dominant wide-area technology for wireless internet connectivity.•Wi-Fi will remain the dominant indoor technology for wireless internet connectivity.