Intelligent Connectivity. Abdulrahman Yarali
Чтение книги онлайн.

Читать онлайн книгу Intelligent Connectivity - Abdulrahman Yarali страница 19

Название: Intelligent Connectivity

Автор: Abdulrahman Yarali

Издательство: John Wiley & Sons Limited

Жанр: Программы

Серия:

isbn: 9781119685210

isbn:

СКАЧАТЬ can improve themselves instead of doing some specific tasks at hand. However, one must also consider the deep neural network option, as it is an ANN but with multiple inputs and output layers. The network moves based on calculating the probability of multiple outputs and presents the seemingly most appropriate options in light of a given problem (Katsaros and Dianati 2017). Through their implementation with computer vision, speech recognition, network filtering, social media filtering, etc., deep learning has achieved a completely different domain, which has moved close to the manifestation of actual AI in terms of the improvement factor.

      2.1.4 Consideration of the Next Generation Wireless Technology

      Communication is always at the forefront of all conversations about human innovation and realization. One of the most consequential developments to happen all across this specific domain involves that of wireless communication. In that specific definition, telephone services are provisioned to remote phone devices, allowing free movement instead of just being fixed at a single location as it had been in the past. These devices specifically receive and can send radio signals with cellular base stations fixed in proximity and utilize high‐performing antennas (Hassabis et al. 2017). These are then connected to cable communication networks and switching systems that perform the translation of the all‐important data, which is being transmitted as audio signals. The 5G constitutes next‐generation cellular system technology, where the Third Generation Partnership Project (3GPP) defines it as the 5G New Radio (5G NR) to indicate the developments and innovations across cellular technology as well as other systems (Al‐Falahy and Alani 2017). This transition and evolvement follow that of past generations of second generation (2G), third generation (3G), and fourth generation (4G) networks, respectively, in the past. The 5G NR will carry forward all the wireless communication expectations of the past while also including essential functions that contribute to the enhancements of private networks, which may have a wide field of applications across domains like the IoT and critical industrial sector communications at large.

      At present, three specific implementation plans have been reserved that form the prospective aim of the entire field of 5G technology at large. The first one is Enhanced Mobile Broadband (eMBB), which will act as the successor of the highest standard of internet services at the moment, the Fourth Generation Long‐Term Evolution () Broadband services (Chen and Zhao 2014). These should have a better capacity, faster connections, and a higher quality of throughput, which will intrinsically allow for a higher degree of communications than at any time before. The Ultra‐Reliable Low‐Latency Communications (uRLLC) refers to enhancing the network variables that could promote robust and uninterrupted communications under any given setting. On the other hand, Massive Machine Type Communications (mMTC) would allow for a greater inclusion of low‐cost, low‐power devices across a network with a significant focus upon high scalability and better battery performance (French and Shim 2016). According to the International Telecommunications Union's (ITU) IMT 2020 standard, the connectivity speed benchmark has been kept only slightly higher than that which 4G LTE provided.

      2.1.5 Potential of AI and 5G Network Technology Together

      The 5G networks must present a chaotic and confusing structure in its innate formation that has not yet been anticipated by those present in the telecommunication industry. If there is no proper mode of assurance, the sheer growth that should occur horizontally across the board could result in extremely critical scenarios (Sánchez, Sánchez‐Picot, and De Rivera 2015). Moreover, the entire scenario is quite inimitably challenging, to say the least (Al‐Falahy and Alani 2017). Therefore, the AI routines applicable in the form of machine and deep learning, alongside the potential algorithms, could nevertheless prove to be extremely beneficial and could lead to the necessary innovations required across both technologies.

      It is essential to consider that the MIMO possibilities are achievable, especially considering the case of what deep learning brings to the table. With the help of such a technology, it is entirely plausible that cell site distribution and leveraging associated processes will become completely possible (Katsaros and Dianati 2017). In addition to this, site maintenance and repair operations could also be managed better, especially when considering that the 5G Network case is spread quite widely. Many learning algorithms could be implemented to satisfactorily deal with the multidimensional data in 5G that will often coalesce, transform, or shift from one specific type to another (Akyildiz, Wang, and Lin 2015). Essentially speaking, the chaotic nature of 5G would be best brought under control by the effective use across its systems.

      However, there are also risk considerations. It must not be forgotten that the large amounts of data that need to be produced for the AI to work properly will require a great availability of sources (Palattella et al. 2016). Therefore, it can be assumed that there could be a critically threatening scenario for all those involved in the industry when there could be a great and constant demand for more data (Duan and Wang 2015). In the past, many software companies illegally sold the private data of users to many unscrupulous entities who remain active throughout the internet. Thus, cybersecurity is an issue that must be considered to a critical extent.

      By the time 5G networks and systems arrive in full force, there will be a great deal of consideration with regards to numerous security aspects. The criticality of addressing cybersecurity concerns has been growing over the years, as the impact of such instances eventually became quite widespread. Moreover, there is little awareness of all the risks evident at present, and the likeliness of cyberattacks affecting individuals greatly increases (French and Shim 2016). The 5G technology holds immense potential for realizing many IoT devices and making sure that their processes are as effective as possible (Akyildiz, Wang, and Lin 2015). This will inevitably lead to an explosion in the number of IoT devices connected to the internet, directly or indirectly. Moreover, there would be a significant increase in interconnectivity across the board. This specifically means that a single attack can cause maximum harm in terms of coverage, which is possible since these devices will be connected to multiple sub‐networks to provide agility and flexibility in operations.

      Additionally, security concerning dissemination will also become a definite challenge. When considering IoT technologies, it is necessary to highlight a bit of revelation about the exact nature of the change. IoT is everyday “things” that people usually use in their daily lives. However, they are then optimized to function СКАЧАТЬ