Connect : ComSoc Linkedin ComSoc Twitter ComSoc Facebook ComSoc You Tube

ComSoc technews

Using Global Content Balancing to Solve the Broadband Penetration Problem in the Developing World: Case Study, India

CTN Issue: May 2012
This very interesting article is unusual in that it successfully combines technical and business aspects to explain how the general expectation that growing broadband penetration is an inexorable force may not be true in all cases. Readers in the developed world (e.g. US, EU) and/or in countries that have made broadband deployment a societal goal (e.g S. Korea) have seen broadband availability and the consequent growth of the internet-based economy (e.g. online newspaper readership) steadily increase over the past decade. The growth may have been top down driven and rapid (as in S. Korea) or market driven and in fits and starts (as in the US), but the growth has taken place. IEEE Communications Magazine

Secure Communication in the Low-SNR Regime

CTN Issue: May 2012
Secure transmission of confidential messages is a critical issue in communication systems and especially in wireless systems. This article addresses the issue of secure communications using multiple transmit and multiple receive antennas using low power in a wireless system with eavesdroppers. One measure of security is the secrecy capacity, which is the maximum data rate that can be obtained without an eavesdropper being able to decode the communications. This paper derives the fundamental limits on the secrecy capacity in the low signal-to-noise ratio regime, showing the minimum energy required to send bits reliably and securely, which is important to conserve the battery life of wireless devices. IEEE Transactions on Information Theory

Optimization for Time-driven Link Sleeping Reconfigurations in ISP Backbone Networks

CTN Issue: May 2012
Energy efficiency in operational ISP networks has been regarded as an increasingly important research issue in recent years. Towards this end, network resource optimization through sleeping reconfiguration has been proposed to reduce energy consumption when the traffic demands are at their low levels. The strategy is to configure a subset of network devices to the sleep mode when it is not required for the network to work at its full capacity during the off-peak time. Network Operations and Management Symposium 2012

IT service outages: Shorter or Fewer?

CTN Issue: May 2012
Maintaining high availability is a sine qua non for today’s IT service providers. Customer demands are on the rise, and service outages in high-profile application areas such as credit card payment systems rapidly hit the news headlines. However, despite all the attention, the most popular concept of service availability is surprisingly crude, and often reduced to just a single figure (such as 99.98%). IEEE Transactions on Network and Service Management

Voronoi Tessellation Based Interpolation Method for Wi-Fi Radio Map Construction

CTN Issue: April 2012
With the proliferation of smartphones and Wi-Fi hot spots, localization techiques based on radio fingerprinting is drawing great attention these days. Radio fingerprinting localization can achieve much higher accuracy than triangulation- or proximity-based localization, provided that an accurate radio map is available. Construction of such a radio map (known as calibration) usually requires tremendous time and efforts and new innovative ways to reduce these efforts are widely being pursued. IEEE Communications Letters