Report itu-r m. 2038 Technology trends


General-purpose programmable platforms



Download 490.99 Kb.
Page31/36
Date31.01.2017
Size490.99 Kb.
#13092
1   ...   28   29   30   31   32   33   34   35   36

1 General-purpose programmable platforms


As generally defined by literature on the subject, a general-purpose technology possesses two key features that enable it to produce profound and lasting economic benefits:

– Technological dynamism; the technology has the ability to continually advance in performance.

– Broad application; the technology can be used for a wide variety of purposes.

As the cost of the technology decreases, innovators can apply it to more and more areas of human activity; proliferating its deployment through large segments of the population, thereby increasing its impact on the whole society.

New mobile user equipment (UE) are assuming these characteristics by:

– Containing high power general-purpose processors that follow Moore’s law of dramatically increasing price/performance.

– Providing a flexible, programmable platform that can be used for an ever-increasing variety of uses.

2 High-level concerns for mobile user equipment


The convergence of wireless connectivity and a general-purpose programmable platform heightens some existing concerns and raises new ones, so that environmental factors as well as traditional technology and market drivers will influence the architecture of these devices.

2.1 Environmental factors


On the environmental side, the situation can be viewed as a three-person game of the following fundamental interests:

– Economic: the commercial, consumer, and societal benefits of a product or service.

– Security: protection of commercial, consumer and public assets.

– Privacy: protection of the sensitive data from unauthorized access.


2.1.1 Economic


From a business perspective this is of course creating products or services that customers find attractive. There can also be non-commercial societal values desired.

2.1.2 Security


Against the great benefits of programmability, however, we have the spectre of security risks. These can take the form of network damaging viruses and denial of service attacks, fraudulent use of the network, and the piracy of spectrum; access and damage to sensitive data behind corporate firewalls; digital content theft; and theft or damage of customer applications or data.

2.1.3 Privacy


Against the need for authentication to combat commercial fraud, and legitimate law enforcement requirements, we must also balance the need to maintain the privacy of individuals and corporations against unwarranted invasion such as unauthorized access to customer proprietary network information, and sensitive local user data such as stored in persistent memory or generated by context-aware technology.

2.2 Key technological and market drivers


Combining with the environmental factors we have traditional market and technology drivers:

2.2.1 User value pull


- The deployment of robust packet data network capabilities, which allow new data-intensive software applications that integrate Internet and multimedia applications, such as streaming video, multimedia, animated graphics, m-commerce, and network connectivity. And many of these applications may be personalized or “Context Aware” with sensitive user information.

- The desire by consumers and mobile professionals to access secure, data-intensive applications.


2.2.2 Security requirements pull


- Dynamic security algorithms, mechanisms, and technologies.

- Authentication technology including biometric devices.

- Digital rights management for valuable content protection.

2.2.3 Technology enablers


- The emergence of low-power, high-performance microprocessors, dense memory, and efficient baseband logic has created the opportunity for placing unprecedented capabilities in the hands of users.

- Low-cost, high-performance servers, deployed in the infrastructure, to address the interface between information sources and wireless clients, and to make end-and-end capabilities a reality.

– Distributed communications technologies enabled by service discovery software middle-ware.

3 High level architectural trends for mobile user equipment


To meet the needs of network security and integrity earlier generation application development and delivery mechanisms for wireless devices was a serial and slow process. Hardware (the silicon and device) was developed first; applications were then written for a particular hardware and air interface; finally hardware and applications were then tested together to ensure proper operation for each specific air interface and network. However such a paradigm would not be viable to meet the user expectations for IMT 2000 and systems beyond IMT 2000.

- Applications development would not be able to keep up with the pace of the Internet growth if this serial development process were to continue.

- In addition to application software development, SDR technologies are enabling more and more air interface and network functions to be performed in software.

- Likewise security algorithms and technologies need to be continually evolving and improving to stay ahead of malicious intent and breaches.

To maintain network and user space integrity, communications software will be “decoupled” and executed in parallel with user applications being written to a general-purpose processor running in a general-purpose execution environment. This partitioning maximizes the economic viability by allowing application development to evolve independent from communication standards, as well as enhancing security by providing autonomous network and user spaces.

Creating coexistent autonomy for the radio subsystem, application subsystem, and memory subsystems portions is evolving as a means to solve the triple environmental requirements of enabling economically viable products and services; while maintaining network and corporate security, and user sovereignty over application space and data privacy. Put anecdotally, “good fences make good neighbours”.

By greatly reducing the interdependencies of the three players (economics, security, privacy) experimentation for finding the equilibrium can occur much more quickly and at much lower cost.



Download 490.99 Kb.

Share with your friends:
1   ...   28   29   30   31   32   33   34   35   36




The database is protected by copyright ©ininet.org 2024
send message

    Main page