Explore chapters and articles related to this topic
Photonic Network
Published in Naoaki Yamanaka, High-Performance Backbone Network Technology, 2020
There are two long-standing arguments for building transparent WDM networks. The first concerns format-independence: transparent WDM networks can transport analog or digital or unspecified modulation formats on separate wavelengths of a single network. This is clearly true in principle, and it constitutes an elegant feature of WDM optics. It is our working assumption, however, that the case for network-transparency will not rest on this form of format-independence. Global momentum towards digital intensity-modulated systems in general, and towards SONET and SDH protocols and bit rates in particular, has fast become overwhelming. What is critical instead is that a single network be capable of transporting a diversity of services— SONET, ATM, and IP-based—at a restricted set of specified standard bit rates.
Mobility Management in Heterogeneous Wireless Systems
Published in K. R. Rao, Zoran S. Bojkovic, Bojan M. Bakmaz, Wireless Multimedia Communication Systems, 2017
K. R. Rao, Zoran S. Bojkovic, Bojan M. Bakmaz
The popularity of the Internet and rapid development and acceptance of wireless communications have led to the inception and development of the mobile Internet infrastructure with a goal to provide an end-to-end IP platform supporting various multimedia services. Mobile Internet applications have become popular and are being used widely. The concept of next generation networks includes the ability to make use of multiple broadband technologies and to support generalized mobility. The heterogeneity in the intertechnology roaming paradigm magnifies the mobility effect on system performance and user-perceived quality of service, necessitating novel mobility modeling and analysis approaches for performance evaluation. Because each individual network has its own characteristics (e.g., spectrum, multiaccess, and signaling) and application requirements (e.g., bandwidth, delay, and jitter) facilitating interoperability within the next generation framework raises several key design issues concerning resource management and mobility management. Adequately addressing these issues is of great importance to the successful development of future wireless environments. Seamless services require network and device independence that allow the users to move across different access networks and change computing devices. Mobility management protocols are responsible for supporting seamless services across heterogeneous networks that require connection migration from one network to another. In addition to providing location transparency, the mobility management protocols also need to provide network transparency.
Network-Based Interaction
Published in Julie A. Jacko, The Human–Computer Interaction Handbook, 2012
Although network transparency has many advantages to the user—you do not care about routes through the network, and so on, there are limits to its effectiveness and desirability. Some years ago, I was at a Xerox lab in Welwyn Garden City in the United Kingdom. Randy Trigg was demonstrating some new features of Notecards (an early hypertext system [Halasz, Moran, and Trigg 1987]). The version was still under development and every so often would hit a problem and a LISP debugger window would appear. After using it for a while, it suddenly froze—no debugger window, no error message, just froze. After a few embarrassing seconds, he hit a control key and launched the debugger. A few minutes of frantic scanning through stack dumps, program traces, and so on, and the reason became clear to him. He had demonstrated a feature that he had last used on his workstation at Palo Alto. The feature itself was not at fault, but required an obscure font that he had on his own workstation, but not on the machine there in Welwyn. When Notecards had requested the font, the system might have thrown up an error window, or substituted a similar font. However, in the spirit of true network transparency, the location of the font should not matter. Having failed to find it on the local machine, it proceeded to interrogate machines on the local network to see if they had it, it then proceeded to scan the Xerox U. K. network, and world network. Eventually, if we had waited long enough, it would have been found on Randy’s machine in Palo Alto. Network transparency rarely extends to timing!
Exploiting European GNSS and Ethereum in location proof systems
Published in International Journal of Digital Earth, 2022
A Blockchain network can be permissionless or permissioned (Helliar et al. 2020). The former, also known as public blockchain, is widely used in cryptocurrencies and financial markets. The latter, also known as private blockchain, has entered the domain of business applications and institutional practices. The main characteristics of permissionless blockchains are anonymity and full transparency of transactions over open-source protocols. In contrast, permissioned blockchains are developed by private entities, and for this reason, the network transparency and participants' privacy are controlled by the organization itself. Hybrid blockchains are used by organizations requiring a private, permission-based system alongside a public permissionless system. This setting allows the organization to control access to data stored in the blockchain. Consortium or federated blockchains are similar to hybrid blockchains but are maintained and shared among multiple organizations.
Integrating circular economy and Industry 4.0 for sustainable supply chain management: a dynamic capability view
Published in Production Planning & Control, 2022
Haiyan Lu, Guoqing Zhao, Shaofeng Liu
The systemic perspective, on the one hand, drives an integrated view of sustainability practice; on the other hand, it imposes the challenge and difficulty of establishing the required dynamic system. Reliable information must be shared in a real-time manner throughout the whole supply chain to enable a quick response to changes. This would lead to great demands on flexibility and agility to facilitate the dynamic construction of temporary processes and network transparency of the supply chain (Verdouw et al. 2018). However, many supply chain actors, such as small and medium-sized enterprises (SMEs), might find it challenging to invest in advanced technologic and information systems for fulfilling the requirement of transparency and integration. Data overflow is another barrier in the complex dynamic system (Sjodin et al. 2018). For example, the design and operation in the engineering system requires specific methodologies to capture and solve the structural and behavioural challenges (Kuznetsova, Zio, and Farel 2016). However, uncertainty and risks will increase as inefficient use of innovative technology and information system may increase the system’s complexity (Sjodin et al. 2018). Instead of losing focus, companies might need to strategically decide on their core competencies along with consideration of the complex and dynamic nature, rather than be driven by the overwhelming data system.
The Generativity of Social Media: Opportunities, Challenges, and Guidelines for Conducting Experimental Research
Published in International Journal of Human–Computer Interaction, 2018
A third guideline associated with study planning relates to the design of the artificial environment. On that matter, we advise researchers to rely on existing research and theory to guide the design of the hybrid SMN experimental platform (guideline #3). This will help researchers ensure that they are not omitting an important characteristic of the type of hybrid SMN they study. In the MyTable studies, we used Kane et al.’s (2014) typology (see Table 4), which highlights four core features: user profiles, social ties, search mechanisms, and network transparency. An additional important benefit of drawing on an existing framework is in terms of cumulative research because this practice can help establish a common basis upon which to compare the influence of particular design features.