ABSTRACT
Modern communications systems rely on assumptions of centralized systems and underlying infrastructure that make them vulnerable in computing within limits scenarios. In this paper we offer case studies of issues facing connectivity in three locations in developing regions as a proxy for networks in such scenarios. We explore obstacles presented by such circumstances and future research directions for systems in resource-poor networking environments. We propose democratizing infrastructure deployment in a bottomup manner and re-thinking network architectures to be more decentralized with less reliance on centralized support systems.
- http://www.openbts.org. {Online; accessed: 2016-04-01}.Google Scholar
- So much going on! http://rhizomatica.org/2015/01/14/so-much-going-on/. {Online; accessed: 2016-04-8}.Google Scholar
- 3GPP. Network architecture. TS 23.002, 3rd Generation Partnership Project (3GPP), Sept. 2008.Google Scholar
- J. Chen. Computing within limits and ICTD. First Monday, 20(8), 2015.Google Scholar
- J. M. Greer. How civilizations fall: A theory of catabolic collapse. http://ecoshock.org/transcripts/greer_on_collapse.pdf, 2005. {Online; accessed 20-April-2016}.Google Scholar
- K. Heimerl and E. Brewer. The village base station. In NSDR, San Francisco, CA, USA, June 2010. Google ScholarDigital Library
- K. Heimerl, S. Hasan, K. Ali, E. Brewer, and T. Parikh. Local, sustainable, small-scale cellular networks. In ICTD '13, Cape Town, South Africa, Dec. 2013. Google ScholarDigital Library
- D. L. Johnson, E. M. Belding, and G. van Stam. Network traffic locality in a rural african village. In ICTD '12, Atlanta, Georgia, USA, Mar. 2012. Google ScholarDigital Library
- F. La Rue. Report of the special rapporteur on the promotion and protection of the right to freedom of opinion and expression. United Nations, May 2011.Google Scholar
- L. Lei, Z. Zhong, C. Lin, and X. Shen. Operator controlled device-to-device communications in LTE-advanced networks. IEEE Wireless Communications, 19(3):96--104, June 2012.Google Scholar
- M. Palola, M. Matinmikko, J. Prokkola, M. Mustonen, M. Heikkilä, T. Kippola, S. Yrjölä, V. Hartikainen, L. Tudose, A. Kivinen, J. Paavola, and K. Heiska. Live field trial of licensed shared access (LSA) concept using LTE network in 2.3 GHz band. In Dynamic Spectrum Access Networks (DYSPAN), Mclean, VA, USA, Apr. 2014.Google ScholarCross Ref
- M. Pizzi. Logging on in Za'atari: Part I. http://www.smex.org/logging-on-in-zaatari-part-i/. {Online; accessed: 2016-04-25}.Google Scholar
- B. Raghavan and J. Ma. Networking in the long emergency. In 2nd ACM SIGCOMM workshop on Green networking, Toronto, ON, Canada, Aug. 2011. Google ScholarDigital Library
- J. P. Rula and F. E. Bustamante. Behind the curtain: Cellular DNS and content replica selection. In IMC '14, Vancouver, BC, Canada, Nov. 2014. Google ScholarDigital Library
- P. Schmitt, D. Iland, E. Belding, B. Tomaszewski, Y. Xu, and C. Maitland. Community-level access divides: A refugee camp case study. In ICTD '16, Ann Arbor, MI, USA, June 2016. Google ScholarDigital Library
- P. Schmitt, D. Iland, M. Zheleva, and E. Belding. HybridCell: Cellular connectivity on the fringes with demand-driven local cells. In IEEE INFOCOM '16, San Francisco, CA, USA, Apr. 2016.Google ScholarDigital Library
- P. Schmitt, R. Raghavendra, and E. Belding. Internet media upload caching for poorly-connected regions. In ACM DEV, London, UK, Dec. 2015. Google ScholarDigital Library
- B. Tomlinson, M. Silberman, D. Patterson, Y. Pan, and E. Blevis. Collapse informatics: augmenting the sustainability & ICT4D discourse in HCI. In CHI '12, May 2012. Google ScholarDigital Library
- Wikipedia. Macha, Zambia --- Wikipedia, the free encyclopedia. http://en.wikipedia.org/wiki/Macha,_Zambia, 2014. {Online; accessed 4-April-2016}.Google Scholar
- M. Zheleva, A. Paul, D. L. Johnson, and E. Belding. Kwiizya: Local Cellular Network Services in Remote Areas. In MobiSys '13, Taipei, Taiwan, 2013. Google ScholarDigital Library
- M. Zheleva, P. Schmitt, M. Vigil, and E. Belding. Bringing visibility to rural users in Cote d'Ivoire. In ICTD '13, Cape Town, South Africa, Dec. 2013. Google ScholarDigital Library
- Navigating connectivity in reduced infrastructure environments
Recommendations
Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure
WWW '13: Proceedings of the 22nd international conference on World Wide WebRecent trends in public-key infrastructure research explore the tradeoff between decreased trust in Certificate Authorities (CAs), resilience against attacks, communication overhead (bandwidth and latency) for setting up an SSL/TLS connection, and ...
Infrastructure for automatic dynamic deployment of J2EE applications in distributed environments
CD'05: Proceedings of the Third international working conference on Component DeploymentRecent studies have shown the potential of using component frameworks for building flexible adaptable applications for deployment in distributed environments. However this approach is hindered by the complexity of deploying component-based applications, ...
Comments