Intelligent Connectivity. Abdulrahman Yarali

Intelligent Connectivity - Abdulrahman Yarali


Скачать книгу
communication expectations of the past while also including essential functions that contribute to the enhancements of private networks, which may have a wide field of applications across domains like the IoT and critical industrial sector communications at large.

      At present, three specific implementation plans have been reserved that form the prospective aim of the entire field of 5G technology at large. The first one is Enhanced Mobile Broadband (eMBB), which will act as the successor of the highest standard of internet services at the moment, the Fourth Generation Long‐Term Evolution () Broadband services (Chen and Zhao 2014). These should have a better capacity, faster connections, and a higher quality of throughput, which will intrinsically allow for a higher degree of communications than at any time before. The Ultra‐Reliable Low‐Latency Communications (uRLLC) refers to enhancing the network variables that could promote robust and uninterrupted communications under any given setting. On the other hand, Massive Machine Type Communications (mMTC) would allow for a greater inclusion of low‐cost, low‐power devices across a network with a significant focus upon high scalability and better battery performance (French and Shim 2016). According to the International Telecommunications Union's (ITU) IMT 2020 standard, the connectivity speed benchmark has been kept only slightly higher than that which 4G LTE provided.

      2.1.5 Potential of AI and 5G Network Technology Together

      The 5G networks must present a chaotic and confusing structure in its innate formation that has not yet been anticipated by those present in the telecommunication industry. If there is no proper mode of assurance, the sheer growth that should occur horizontally across the board could result in extremely critical scenarios (Sánchez, Sánchez‐Picot, and De Rivera 2015). Moreover, the entire scenario is quite inimitably challenging, to say the least (Al‐Falahy and Alani 2017). Therefore, the AI routines applicable in the form of machine and deep learning, alongside the potential algorithms, could nevertheless prove to be extremely beneficial and could lead to the necessary innovations required across both technologies.

      It is essential to consider that the MIMO possibilities are achievable, especially considering the case of what deep learning brings to the table. With the help of such a technology, it is entirely plausible that cell site distribution and leveraging associated processes will become completely possible (Katsaros and Dianati 2017). In addition to this, site maintenance and repair operations could also be managed better, especially when considering that the 5G Network case is spread quite widely. Many learning algorithms could be implemented to satisfactorily deal with the multidimensional data in 5G that will often coalesce, transform, or shift from one specific type to another (Akyildiz, Wang, and Lin 2015). Essentially speaking, the chaotic nature of 5G would be best brought under control by the effective use across its systems.

      However, there are also risk considerations. It must not be forgotten that the large amounts of data that need to be produced for the AI to work properly will require a great availability of sources (Palattella et al. 2016). Therefore, it can be assumed that there could be a critically threatening scenario for all those involved in the industry when there could be a great and constant demand for more data (Duan and Wang 2015). In the past, many software companies illegally sold the private data of users to many unscrupulous entities who remain active throughout the internet. Thus, cybersecurity is an issue that must be considered to a critical extent.

      By the time 5G networks and systems arrive in full force, there will be a great deal of consideration with regards to numerous security aspects. The criticality of addressing cybersecurity concerns has been growing over the years, as the impact of such instances eventually became quite widespread. Moreover, there is little awareness of all the risks evident at present, and the likeliness of cyberattacks affecting individuals greatly increases (French and Shim 2016). The 5G technology holds immense potential for realizing many IoT devices and making sure that their processes are as effective as possible (Akyildiz, Wang, and Lin 2015). This will inevitably lead to an explosion in the number of IoT devices connected to the internet, directly or indirectly. Moreover, there would be a significant increase in interconnectivity across the board. This specifically means that a single attack can cause maximum harm in terms of coverage, which is possible since these devices will be connected to multiple sub‐networks to provide agility and flexibility in operations.

      Additionally, security concerning dissemination will also become a definite challenge. When considering IoT technologies, it is necessary to highlight a bit of revelation about the exact nature of the change. IoT is everyday “things” that people usually use in their daily lives. However, they are then optimized to function with the inserted capabilities of doing the functions they were meant to do, and more (Al‐Falahy and Alani 2017). Turning ordinary objects into specific IoT devices is challenging across every instance. It is also no wonder that these concerns that are being raised will extend to the provisioning of actual security allocations for these particular and different devices (Li, Da Xu, and Zhao 2018). Security solutions also follow monitoring protocols in real‐time and are often limited by the network's bandwidth capability (Arel, Rose, and Karnowski 2010). However, there is a constant look‐out for user performance upon the specified bandwidth through these specifications. The advent of 5G may make all these legacy strains of security solutions completely obsolete.

      IoT devices are the ultimate manifestations of what automation is supposed to be. However, this is not specifically focused upon 5G networks squarely, as it will also require the same treatment. The rise in security allocations that are automated across widespread systems has been quite prescient for some time. However, because of the existing challenges in the proper form of integration that many architectures and interfaces have encountered (Arel, Rose, and Karnowski 2010), the requirements state that security must synchronize with the data at every possible level, irrespective of the physical property or software. This fact is more problematic, especially when the software divide has become extremely complex. This is all in addition to the prescient need in case AI becomes an indelible part of 5G technology at large


Скачать книгу