High-Speed Mobile Communications in Hostile Environments

نویسنده

  • S Agosta
چکیده

With the inexorable increase in the use of mobile devices, wireless connectivity is expected by users anywhere, anytime. In general, this requirement is addressed in office buildings or public locations through the use of Wi-Fi technology but Wi-Fi is not well adapted for use in large experiment halls and complex underground environments, especially those where radiation exposure is an issue, such as the LHC tunnel and experimental caverns. 4G/LTE technology, however, looks to be well adapted to addressing mobility needs in such areas. We report here the studies CERN has undertaken on the use of 4G/LTE in the LHC tunnel, presenting results on the data throughput that can be achieved and discussing issues such as the provision of a consistent user experience.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mobile robot wall-following control using a behavior-based fuzzy controller in unknown environments

This paper addresses a behavior-based fuzzy controller (BFC) for mobile robot wall-following control.The wall-following task is usually used to explore an unknown environment.The proposed BFC consists of three sub-fuzzy controllers, including Straight-based Fuzzy Controller (SFC),Left-based Fuzzy Controller (LFC), and Right-based Fuzzy Controller (RFC).The proposed wall-...

متن کامل

Hybrid Satellite-Terrestrial System

Telecommunication networks of the future are believed to involve systems that will work on different technologies, such as WiFi, WiMAX, 2G/3G, LTE, and satellite. In order to efficiently orchestrate the working of the different technologies, the idea of hybrid networks is being seriously considered. The chief driving factor is to facilitate and then exploit the cooperation of different wireless...

متن کامل

Detection of Hidden Hostile/Terrorist Groups in Harsh Territories by Using Animals as Mobile Biological Sensors

Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist groups, the instigators of terrorism. These groups have a clear understanding of the relative ineffectiveness of counter-guerrilla operations and rely on guerrilla warfare to...

متن کامل

Navigation of a Mobile Robot Using Virtual Potential Field and Artificial Neural Network

Mobile robot navigation is one of the basic problems in robotics. In this paper, a new approach is proposed for autonomous mobile robot navigation in an unknown environment. The proposed approach is based on learning virtual parallel paths that propel the mobile robot toward the track using a multi-layer, feed-forward neural network. For training, a human operator navigates the mobile robot in ...

متن کامل

Developing Adaptive Applications: The MOST Experience

Future computer environments will include mobile computers which will either be disconnected, weakly inter-connected by low speed wireless networks such as GSM, or fully inter-connected by high speed networks ranging from Ethernet to ATM. Such environments place unique demands on systems, requiring software to dynamically adapt to rapid and significant fluctuations in communications quality-of-...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015