Strategies to reduce postal network access points: from demographic to spatial distribution criteria

2021 ◽  
Vol 69 ◽  
pp. 101189
Author(s):  
Giuseppe Bruno ◽  
Manuel Cavola ◽  
Antonio Diglio ◽  
Carmela Piccolo ◽  
Eduardo Pipicelli
2017 ◽  
Vol 48 ◽  
pp. 69-75 ◽  
Author(s):  
Dragana Šarac ◽  
Marija Unterberger ◽  
Bojan Jovanović ◽  
Momčilo Kujačić ◽  
Nikola Trubint ◽  
...  

2019 ◽  
Vol 281 ◽  
pp. 05002
Author(s):  
Elie Nasr ◽  
Mohammad Jalloul ◽  
Joseph Bachalaany ◽  
Roy Maalouly

The aim of this paper is to analyze the Wi-Fi network vulnerabilities and risk assessment in Lebanon in order to raise awareness to the Lebanese public by informing them of threats that occur on the network and their impact. The analysis is done by first performing a wardrive; this involves capturing the network access points in several Lebanese regions with the use of two programs: Acrylic Wi-Fi Professional™, and Kismet™, as well as connecting an Alfa Network Antenna to the device in order to increase the range of capture. The data collected are stored in a database where they are processed in order to generate a statistics report of the security and risk level of the network in selected cities. Moreover, a custom survey of the basic knowledge of networking and security is publicly distributed.


Author(s):  
Jahan Hassan ◽  
Björn Landfeldt ◽  
Albert Y. Zomaya

Wireless local area networks (WLAN) are rapidly becoming a core part of network access. Supporting user mobility, more specifically session continuation in changing network access points, is becoming an integral part of wireless network services. This is because of the popularity of emerging real-time streaming applications that can be commonly used when the user is mobile, such as voice-over-IP and Internet radio. However, mobility introduces a new set of problems in wireless environments because of handoffs between network access points (APs). The IEEE 802.11i security standard imposes an authentication delay long enough to hamper real-time applications. This chapter will provide a comprehensive study on fast authentication solutions found in the literature as well as the industry that address this problem. These proposals focus on solving the mentioned problem for intradomain handoff scenarios where the access points belong to the same administrative domain or provider. Interdomain roaming is also becoming common-place for wireless access. We need fast authentication solutions for these environments that are managed by independent administrative authorities. We detail such a solution that explores the use of local trust relationships to foster fast authentication.


Author(s):  
A. M. Haseloff

The Internet is changing dramatically the way people live, work, communicate, recreate, and participate in public life. But the growth and penetration of the Internet are far from being distributed equally around the globe. In developed countries, the Internet today reaches substantial proportions of the population (e.g., Finland [50,7 %], Germany [56,2 %], the United States [68,8 %]), but in developing countries, Internet penetration often is very low. In Africa, 29 countries still have an Internet penetration of less then 1% (Internet World Stats, 2005). The unequal access to information and communication technologies (ICTs) today often is called the digital divide. This catchy label stands for a multidimensional phenomenon and describes disparities in access to ICTs along various axes and at various levels. Disparities can be found not only in who physically has access to new technologies and who does not, but also in the distribution of the skills required to use the new technologies in an effective way (Hargittai, 2002; Warschauer, 2003). At the next level, disparities can be found in bandwidth and content available to different groups. These disparities are found among countries (global divides) and among different groups within countries (national divides). Although the existence of a digital divide in one or the other form is clearly accepted among scholars, the dimensions, dynamics, and relevance of this phenomenon are still being discussed strongly (for a more detailed discussion, see Cammaertes, Van Audenhove, Nulens & Pauwels, 2003; Compaine, 2001; Mossberger, Tolbert & Stansbury, 2003; Norris, 2001; Warschauer, 2003; ). One of the main strategies that is used to spread access to new technologies is the implementation of public network access points (PNAPs) that provide shared and, therefore, cheaper access to communities with low incomes. PNAPs can be defined as physical spaces where people can access ICT for personal, educational, economic, and democratic development without having to own the necessary hardware and software. This article will give an introduction to PNAPs, starting with a short look at the emergence of this access model, which can be traced back to the early 1980s. After that, the different models that have evolved over the years in different regions of the world will be described briefly before taking a closer look at the role that PNAPs can play in the context of e-governance. Finally, some critical issues like sustainability, content, and management will be discussed before conclusions are drawn.


Sign in / Sign up

Export Citation Format

Share Document