scholarly journals Sixth Generation (6G) Cognitive Radio Network (CRN) Application, Requirements, Security Issues, and Key Challenges

2021 ◽  
Vol 2021 ◽  
pp. 1-18
Author(s):  
Muhammad Muzamil Aslam ◽  
Liping Du ◽  
Xiaoyan Zhang ◽  
Yueyun Chen ◽  
Zahoor Ahmed ◽  
...  

Recently, 5G installation has been started globally. Different capabilities are in the consistent procedure, like ultrareliability, mass connectivity, and specific low latency. Though, 5G is insufficient to meet all the necessities of the future technology in 2030 and so on. Next generation information and communication technology is playing an important role in attraction of researchers, industries, and technical people. With respect to 5G networks, sixth-generation (6G) CR networks are anticipated to familiarize innovative use cases and performance metrics, such as to offer worldwide coverage, cost efficiency, enhanced spectral, energy improved intelligence, and safety. To reach such requirements, upcoming 6G CRNs will trust novel empowering technologies. Innovative network architecture and transmission technologies and air interface are of excessive position, like multiple accesses, waveform design, multiantenna technologies, and channel coding schemes. (1) To content, the condition should be of worldwide coverage, there will be no limit on 6G to global CR communication networks that may require to be completed with broadcast networks, like satellite communication networks, therefore, attaining a sea integrated communication network. (2) The spectrums overall will be entirely travelled to the supplementary rise connection density data rates in optical frequency bands, millimeter wave (mmWave), sub-6 GHz, and terahertz (THz). (3) To see big datasets created because of tremendously varied CR communication networks, antenna rush, diverse communication scenarios, new provision necessities, wide bandwidth, and 6G CRNs will allow an innovative variety of intelligent applications with the assistance of big data and AI technologies. (4) Need to improve network security when deploying 6G technology in CR networks. 6G is decentralized, intended, intelligent innovative, and distributed network. In this article, we studied a survey of current developments and upcoming trends. We studied the predicted applications, possible technologies, and security issues for 6G CR network communication. We also discussed predicted future key challenges in 6G.

Author(s):  
Jeanette Nasem Morgan

This chapter presents the tactics and metrics an organization applies after having made a decision to use outsource providers. Tactics are used to define the nature and specifics of the outsourcing arrangement, as well as to select the contractual basis of the agreement. Organizations that elect to use providers geographically distant from the client site are cautioned to carefully evaluate capabilities, as well as legal and security issues related to external outsourcers. For these purposes, it is critical to align measures of performance compliance in the form of metrics on each MIS outsourcing relationship. When negotiating and establishing the terms of the outsourcing arrangement, management should ensure that appropriate performance metrics are identified and included, as well as flexibility for change is built in to the contract. This chapter addresses some of the methods, as well as some of the metrics that might be used in such contract agreements. The use of contracts and service level agreements are discussed, as well as in depth techniques for conducting validation and background checks on outsource suppliers. Sample outlines for service level agreement preparation and performance specifications are included for the practitioner.


Author(s):  
Munir Abbasi ◽  
Lampros K. Stergioulas

Today, satellite communication networks are being integrated into the infrastructure of modern Terrestrial communication networks and becoming popular for the delivery of educational content and data, as well as education-centric services, including information, tele-conferencing, entertainment, or ‘edutainment’ services. With fresh demand for new services and applications, it is becoming essential that wireless network architecture seamlessly interoperate with new and existing technologies, protocols and standards. This paper presents recent work on the use of hybrid wireless network infrastructures for delivering tele-education and e-learning applications to remote communities by combining a variety of satellite, terrestrial and wireless technologies, and provides the results from live scenarios carried out employing various methods of interoperability testing. The analysis of the results examines a number of different issues such as delay, jitter, packet loss, latency, throughput measurement, and bandwidth. By combining satellite and terrestrial (wireless) technologies, full coverage and high capacity can be achieved for true broadband services for delivering educational content. The interoperability among such diverse networks imposes a number of challenges regarding service provision and management.


Author(s):  
Edward William Chandler

A simple simulation tool was previously developed to simulate the operation and performance of demand-assigned communication networks having time-varying data traffic patterns.  Such networks use protocols to increase or decrease the resources allocated to a network node as the resource needs at that node change.  These resource-allocation protocols have parameters such as numerical thresholds for requesting or releasing resources.  The additional simulator development and execution described herein allows a comparison of performance metrics that result when using the existing MIL-STD-188-186 protocol versus using a proposed alternative protocol.  The network behavior revealed by the simulation results also allows examining network performance trade-offs as values for the protocol parameters are adjusted.  Although commercially available simulation tools could be used for these simulations, such tools are often expensive and sometimes complicated to adapt to new and not yet standardized protocols.  The simple simulation tool that was previously developed is described in an earlier paper and is programmed as an Excel spreadsheet.   It has now been adapted to allow comparing an existing resource-allocation protocol versus a proposed protocol for MIL-STD-188-186.  The simulator allows examination of performance metrics such as the average number of assigned time slots per frame assigned to a transmitting node that has a specified message generation rate, the percentage of generated messages that are discarded prior to transmission due to being queued for an excessive time, and a histogram showing the percentage of messages transmitted with each possible message delivery time.


Author(s):  
Huan Cao ◽  
Lili Wu ◽  
Yue Chen ◽  
Yongtao Su ◽  
Zhengchao Lei ◽  
...  

AbstractSatellite Internet (SI) is a new way to provide internet access all over the world. It will bring great convenience to international communication. Compared with the traditional communication networks, SI has a significant change in network architecture and communication model, which will have an important impact on national information network security. For example, the global interconnected SI consists of a large number of small satellites and each satellite has multi-beams to cover a vast area, which leads to the disorderly flow of information across the border, and greatly increases the difficulty of network protection. Therefore, it is necessary to closely track the development of SI and analyze security problems brought by SI. In this paper, we analyze the security risks of SI from the perspective of national security, network security and equipment security, and thirteen security issues have been summarized to provide reference for the healthy development of SI industry.


2010 ◽  
pp. 1807-1828
Author(s):  
Jeanette Nasem Morgan

This chapter presents the tactics and metrics an organization applies after having made a decision to use outsource providers. Tactics are used to define the nature and specifics of the outsourcing arrangement, as well as to select the contractual basis of the agreement. Organizations that elect to use providers geographically distant from the client site are cautioned to carefully evaluate capabilities, as well as legal and security issues related to external outsourcers. For these purposes, it is critical to align measures of performance compliance in the form of metrics on each MIS outsourcing relationship. When negotiating and establishing the terms of the outsourcing arrangement, management should ensure that appropriate performance metrics are identified and included, as well as flexibility for change is built in to the contract. This chapter addresses some of the methods, as well as some of the metrics that might be used in such contract agreements. The use of contracts and service level agreements are discussed, as well as in depth techniques for conducting validation and background checks on outsource suppliers. Sample outlines for service level agreement preparation and performance specifications are included for the practitioner.


Author(s):  
Yan Wang

Cyber-physical systems (CPS) are the physical systems of which individual components have functional identities in both physical and cyber spaces. Given the vastly diversified CPS components in dynamically evolving networks, designing an open and resilient architecture with flexibility and adaptability thus is important. To enable a resilience engineering approach for systems design, quantitative measures of resilience have been proposed by researchers. Yet, domain-dependent system performance metrics are required to quantify resilience. In this paper, generic system performance metrics for CPS are proposed, which are entropy, conditional entropy, and mutual information associated with the probabilities of successful prediction and communication. A new probabilistic design framework for CPS network architecture is also proposed for resilience engineering, where several information fusion rules can be applied for data processing at the nodes. Sensitivities of metrics with respect to the probabilistic measurements are studied. Fine-grained discrete-event simulation models of communication networks are used to demonstrate the applicability of the proposed metrics.


Author(s):  
Munir Abbasi ◽  
Lampros K. Stergioulas

Today, satellite communication networks are being integrated into the infrastructure of modern Terrestrial communication networks and becoming popular for the delivery of educational content and data, as well as education-centric services, including information, tele-conferencing, entertainment, or “edutainment” services. With fresh demand for new services and applications, it is becoming essential that wireless network architecture seamlessly interoperate with new and existing technologies, protocols and standards. This paper presents recent work on the use of hybrid wireless network infrastructures for delivering tele-education and e-learning applications to remote communities by combining a variety of satellite, terrestrial and wireless technologies, and provides the results from live scenarios carried out employing various methods of interoperability testing. The analysis of the results examines a number of different issues such as delay, jitter, packet loss, latency, throughput measurement, and bandwidth. By combining satellite and terrestrial (wireless) technologies, full coverage and high capacity can be achieved for true broadband services for delivering educational content. The interoperability among such diverse networks imposes a number of challenges regarding service provision and management.


Sign in / Sign up

Export Citation Format

Share Document