►
From YouTube: IETF101-GAIA-20180322-1330
Description
GAIA meeting session at IETF101
2018/03/22 1330
https://datatracker.ietf.org/meeting/101/proceedings/
A
B
C
B
B
This
is
the
global
access
to
the
Internet
for
all
and
I
was
talking
to
John
crow
Croft
who's
in
the
back
from
Cambridge
University
he's
the
one
that
came
up
with
a
name.
So
thanks
John
for
naming
us
and
Arjuna
who
used
to
be
the
co-chair
of
Gaia
and
who
deserves
an
enormous
amount
of
credit
for
getting
the
the
group
off
the
ground
and
for
rallying
people
around
the
world
to
talk
about
critical
access
issues,
and
one
of
those
people
that
he's
been
rallying
is
Leandro,
Navarro
and
I'll.
Let
Leandro
introduce
himself.
B
Excellent,
what
we'll
do
is
the
the
agenda
is
online
and
I'm
going
to
pull
that
up
now.
B
People
connecting
to
each
other
are
seeing
each
other
at
meetings.
There's
this
wealth
of
knowledge,
that's
transiting
across
borders
through
meetings
like
this
meetings
that
I
saw
a
PC
may
pull
together.
Some
of
us,
Steve
song
and
I,
were
up
in
Geneva
at
the
beginning
of
this
week
for
something
called
the
World
Summit
on
the
information
society
forum.
B
Sometimes
you
can't
get
a
project
going
because
there's
a
licensing
issue,
small
start-up
networks
in
regions
with
not
a
lot
of
capital,
but
a
lot
of
human
effort.
They
can't
afford
a
year
to
get
a
license
right
or
an
authorization.
So
we've
been
trying
to
work
with
people
to
encourage
the
idea
of
giving
these
small
networks
a
break,
helping
them
out
by
giving
them
social
purpose
or
experimental
licenses
to
get
off
the
ground
with
spectrum
or
changing
Universal
service.
B
There
are
millions
of
dollars
sitting
in
banks
around
the
world
that
are
supposed
to
help
rural
remote
and
underserved
projects.
You
can't
get
them
started,
so
governments
are
beginning
to
realize
that
there's
an
opportunity
to
work
with
technologists
researchers,
universities,
people
like
all
of
us-
to
try
and
promote
connectivity,
because
some
of
the
bigger
companies
right
now
do
not
see
a
return
on
investment
and
going
in
some
of
those
smaller
places.
That's
their
model,
but
we've
we've
seen
models
that
work
at
the
local
level
and
some
people
here
here
to
tell
you
about
that.
B
A
Maybe
one
comment
is
that,
depending
on
the
time
we
have
left
at
the
end,
we
should
probably
try
to
discuss
about
how
we
move
forward
and
especially
as
Jen
said,
I
mean
one
of
the
objectives
is
to
highlight
good
experiences,
and
maybe,
if
we
discuss
about
how
to
make
them
more
visible,
how
to
give
them
an
opportunity
to
be
known
through
the
means
of
the
RTF
documents.
That
would
be
very
useful
in.
B
If
you're,
first-time
attendee,
we've
got
to
show
you
the
note.
Well,
it's
part
of
the
drill
of
the
checklist
of
things
I'm
supposed
to
say
so
one
make
sure
you
fill
out
the
blue
sheets.
If
you
haven't
signed
up
sign
up
this
note,
well
I'm
going
to
go
through
just
a
reminder
of
IETF
policies.
In
effect
various
topics-
patents,
code
of
conduct-
it's
meant
to
point
you
in
the
right
direction.
B
Exceptions
may
apply,
there's
a
patent
policy
definition
and
you
can
see
that
each
of
the
the
website,
if
you
want
to
take
a
look
so
as
a
reminder
by
participating
in
the
IETF,
you
agree
to
follow,
have
processes
and
policies.
If
you're
aware
that
any
IETF
contribution
is
covered
by
patents
or
patent
applications
that
are
owned
or
controlled
by
you
or
your
sponsor,
you
must
disclose
that
fact
or
not
participate
in
a
discussion
as
a
participant
in
or
attendee
to
any
IETF
activity.
B
To
acknowledge
that
written
audio,
video
and
photographic
records
of
meetings
may
be
made
public.
Given
the
European
rules
on
GDP
are
also,
if
you're
in
this
room,
does
anyone
have
a
red
lanyard
on
you
do?
Okay,
so
I'm
gonna
have
to
ask
you:
do
you
mind
that
this
is
being
recorded
because
by
being
in
this
room?
Okay,
thank
you,
wonderful,
there's,
some
other
people
too!
So
I'm
not
saying
I'm,
not
signaling.
B
Anyone
out,
but
I
want
to
be
very
cognizant
that
we're
aware
that
if
you
see
somebody
with
a
lanyard,
that's
orange
or
red,
please
don't
photograph
them
without
asking
them.
For
their
permission.
Also,
just
this
is
being
live-streamed.
So
just
know
that,
and
if
you're
comfortable
great
I
know
your
face
is
a
can
be
considered,
PII
right.
So
as
a
participant
of
sorry,
personal
information,
you
provide
to
the
ITF
will
be
handled
in
accordance
with
the
IETF
privacy
statement
as
a
participant
or
attending.
B
You
agree
to
work
respectfully
with
other
participants
and
please
contact
the
unn
on
buds
team.
That's
weird
word:
if
you
have
questions
or
concerns
about
this
anyway,
there's
more
information
at
this
site.
If
you
have
questions
so
back
to
the
agenda,
we
have
dirt
traulsen
who's
up.
First
and
Dirk
you'll
be
speaking
from
this
microphone
and
we're
going
to
pull
up
your
presentation
and
thank
you
to
everybody
that
expressed
interest
in
coming
and
we're
so
happy
that
you're
here
and
we'll.
B
D
Thanks,
so
this
is
a
small
introduction
into
the
field,
while
in
the
rifle
project
that
we
are
conducting
at
the
moment,
still
the
presentation,
disjoint
renowned
Krishna,
who
stunned
a
lot
of
the
legwork
in
our
company
and
watcher,
who
can't
be,
unfortunately,
from
goofy
dog
net
who
provided
some
of
the
sights
at
the
end.
Let
me
give
you
you
see
the
URL
of
the
project
here,
so
I
didn't
have
a
partner
slide
at
the
moment,
but.
D
If
you
go
to
the
web
site,
you
can
see
the
partners
involved.
Campus
university,
take
the
University
in
Munich
Alto,
but
I
might
miss
a
couple
of
Tallis,
don't
list
them
all.
Just
look
at
the
web
site.
It's
a
neat
project
that
started
in
January
2015.
It
was
meant
and
by
the
end
of
last
year,
but
we
extended
it
in
order.
D
So
by
the
end
of
January,
we
extended
by
two
months
in
order
to
conduct
the
field
trial,
which
you
will
see
in
the
in
the
following
slides
who
is
going
to
last
until
the
end
of
next
week.
That's
when
the
broker,
usually
over
and
I,
come
to
the
next
steps
at
the
very
end
of
the
presentation.
So
the
talk
a
bit
about
the
objective,
just
one
slide
about.
D
But
definitely
we
wanted
to
utilize
a
new
network
architecture
to
provide
better
connectivity
or
Internet
connectivity
for
communities
for
community
networks,
with
better
paying
a
number
of
things
that
the
ones
I
focused
on
here,
which
we
try
to
address
in
the
trial,
is
easy
to
deploy,
meaning
a
software-based
solution,
relatively
simple,
to
manage
performance
benefits
for
certain
IP
based
services,
as
well
as
enabling
services
there
are
otherwise
hard
to
do.
Particular.
D
So
these
two
protists
collaborated
and
what
you
see
here
is
an
edge
IP
architecture
where
we
use
standard
IP
devices,
obviously
like
your
your
home
Rooter,
as
well
as
your
home
devices
that
use
all
of
them
still
IP
based
and
we
replace
the
inside
of
the
infrastructure.
In
the
cloud
you
see,
three
main
components
are
forwarding
nodes
which,
in
our
case
is
the
one
that
we
deployed
in
the
field
file
is
an
SDN
switch.
Soft
switch
and
a
an
open,
V
switch.
D
Tm
and
arvy
are
terms
that
come
out
of
the
information
setting.
Networking
research
and
sense
for
topology
mentioned
rendezvous
because
we
use
a
nice
en
information.
Sending
networking
abstraction
to
realize
the
IP
connectivity
on
top
might
sounds
a
little
bit
strange,
but
it
allows
us
to
do
things
but
they're
very
difficult
to
do
in
a
normal
IP
network
at
the
at
the
at
the
side
of
them.
That's
why
I
decide
you
see
the
border
gateway
so
abnormal
activity
to
peering
networks
and
in
the
case
of
our
futile
deployment,
that's
provided
through
goofy
dotnet.
D
We
use
edge
caching
solutions
to
front-load
content,
which
then
could
be
used,
which
then
it's
consumed
purely
in
the
front
whole
network.
That's
our
aspect
that
mics
at
these
antenna
cheaper
for
some
content
services,
but
just
front
loading
the
content
and
make
it
available
locally,
and
then
we
just
appear
to
other
networks.
These
other
networks
could
be
other
community
networks
or
they
are
just
they.
What
you
commonly
know,
it's
the
normal
internet,
the
from
the
from
an
IP
perspective.
D
D
There,
where
we
just
you,
know
open
up
a
Wi-Fi
access
point,
people
could
connect
to
it
and
you
were
actually
running
over
it.
You
don't
see
any
any
difference,
because
you
just
we
noticed
that
most
of
what
the
people
were
doing
is
accessing
funny
enough
when
they
went
to
the
wife
access
point,
and
probably
that
would
be
slightly
different
today.
I
don't
know
so
it
must
support
the
Korean
Internet.
D
We
hope
obviously
was
better
performance
and
it
addresses
the
affordability
and
key
aspects
in
the
sense
of,
but
that
we
can
provide
advantages
over
normal
IP
and
I
come
to
this
one
in
a
bit.
The
foundations
are
for
other
proposition
that
we've
built
throughout
the
projects,
and
one
of
these
is
the
so-called
surrogate
I
have
a
separate
slides
on
those.
D
These
are
alternative
service,
endpoints
that
are
deployed
within
the
network
in
order
to
either
reduce
latency
or
cost
or
a
cost
of
the
deployment,
and
this
is
all
achieved
through
what
we
call
the
IP
or
HTTP
over
ICN
solution.
If
we
filled
in
these
two
projects
and
arrival
points,
we
also
were
looking
at
new
services
either
by
using
native
ICN.
In
selected
areas,
are
we
haven't
done
an
awful
lot
of
this,
but
you
have,
as
you
know,
this
is
actually
a
different
picture.
D
I
would
be
blessed
in
this
picture,
but
you
also
have
obviously
access
to
the
actual
eyes
here
and
under
light
that
we
are
using
and
therefore
you
can
deploy
in
native
ICM
services.
The
project
just
hasn't
done
that
much
on
this,
because
they're
totally
separate
ICN
work,
that's
currently
ongoing
in
the
community,
but
you
could
utilize
this
also
DTN
based
services
as
one
particular
form
of
an
ICN.
We
have
working
on
delay-tolerant,
networking
and
in
the
trial
that
is
currently
based
on
this
architecture.
D
We
replace
temporarily
the
for
the
last
week,
which
should
be
next
week,
we're
replacing
actually
the
the
trial
with
attn
based
file,
even
though
I
think
the
last
information
I
have
is
meant
to
run
in
parallel
to
this
file
usually
have
some
spare
capacity.
The
deployment
flexibility
we
want
is.
This
is
kinda.
Like
a
terminology
we
developed
in
the
project
together
with
Roger
age,
to
allow
us
to
go
from
really
well-planned
networks.
These
are
not
the
networks.
We're
really
talking
about
well-planned
means.
I
have
a
relatively
good
flexibility
and
ability
to
actually
place
infrastructure.
D
That's
not
always
the
case
right.
We
are
more
after
well
connected
less
well
planned,
and
this
means
when
the
community
secures
the
place.
That's
probably
where
you
put
it
that
might
not
be
optimal.
You
might
want
to
use
the
church
tower,
but
you
can't
get
to
the
church
tower,
so
it
you
just
make
do
with
whatever
you
get
so
it's
more.
This
connectivity
well
connect
connected
is,
is
the
local
connectivity
we
are
using
with
directed
by
face.
Rather,
if
you
well
connected
the
connectivity
itself
is
quite
good,
but.
E
D
It
might
be
saw
optimal
from
a
planning
perspective.
We
also
were
interested
where
the
DTN,
the
DTN
deployments,
come
in
unless
well
connected
and
very
little
planning
almost
down
to
random
encounters,
and
this
is
obviously
where
you
know
your.
Your
fixed
infrastructure
is
literally
out
of
the
window
and
you're
trying
to
make
do
with
whatever
connectivity
that's
currently
available
at
any
point
in
time.
This
is
why
we
had
the
DTN
angle
in
our
trials
as
well.
D
The
the
surrogate
placement
knows
that
is,
we
experiment
in
the
very
beginning
very
much
with
the
edge
caches
which
are
which
are
normal,
HTTP
proxy
caches,
but
they
are
pre
placed
they
offer
pre
place
content,
and
we
replaced
this
with
it
with
an
idea
of
surrogate
servers.
Endpoints,
the
difference
they
are
is
it
keeps
the
it
exposes
the
service
under
the
fully
qualified
domain
name
of
the
original
service,
so
it
isn't
working
in
a
proxy
mode
or
in
a
portal
mode.
Tallis.
D
Our
cellular
operators
has
a
solution
that
is
portal
based
and
therefore
it
is
obviously
exposed
to
the
end-user,
because
you
have
to
access
condom
wire
portal.
In
this
case,
we
are
really
replicating
the
server's
endpoint
in
the
frontal
network,
and
the
entire
service
is
exposed
under
the
original,
fully
qualified
domain
name.
That
obviously
requires
that
you
have
name
authority
to
do
that,
which
were
selected
service
that
you
have.
D
This
is
the
architecture
we
build.
I
won't
go
into
too
much
detail,
but
the
main
message
here
is,
but
the
move
was
to
really
move
from
content
retriever
from
pure
caching
to
entire
service
routing
over
ICN.
So
you
really
front
all
the
entire
service
endpoint
into
the
frontal
frontal
network,
under
this
name
authority,
and
therefore
both
content
as
well
as
computation
is
front
loaded
and
out
of
it
uses
traffic.
D
Obviously,
even
more
so
you
say
computation
content,
the
latency
is
there
for
one
target,
so
really
want
to
make
sure
that
don't
only
your
video
asset
is
there,
but
anything
that's
around
it
in
terms
of
computation
is
in
the
front
a
whole
network
as
well,
not
that
relevant
for
the
community.
Of
course,
you
haven't
done
it,
but
we
pushed
it
in
other
deployments
at
the
moment.
Further,
where
we
have
advanced
infrastructure
is,
for
instance,
network
function,
virtualization
based,
so
the
new
platform
that
we
have
built
from
in
the
digital
side
deploys
entirely
through
an
earthly.
D
We
demonstrated
this
this
year,
where
you
can
boot
a
pristine
infrastructure
at
municipal
scale
within
about
ten
minutes,
and
you
have
your
entire
routing
infrastructure
deployed
and
you
can
run
your
service,
that's
off
it.
But
again,
all
of
the
infrastructure
is
essentially
the
same.
We
deployed
in
the
community
that
book
is
a
slightly
more
powerful,
their
normal.
E
D
White
boxes,
it's
just
in
the
municipal
and
that's
the
deployment
we
have
in
Crystal.
Those
are
you
racks,
so
they're
actually
really
powerful
Dell
service,
while
the
community
networks
be
deployed,
are
slightly
more
resource
constrained,
but
the
computer
architectures
design
alright.
So
therefore
we
see
this
still
as
relatively
interesting.
Once
you
have
advances
in
the
in
the
in
the
convenience
of
structure,
you
can
easily
run
those
in
community
networks,
maybe
in
a
furious
time
good.
What
have
you
actually
deployed?
So
the
actual
feed
part
takes
place
in
Tarragona.
D
That's
not
the
city,
that's
the
community,
which
is
in
Catalonia
it's
a
production
network.
So
it's
actually
they're
real
people
are
part
of
the
trial,
which
is
also
it
explains
a
little
bit
our
delay.
If
you
fiddle
with
people's
real
internet,
you
want
to
make
sure
you're
not
screwing
this
up.
So
that's
a
bit
of
the
issue.
It's
a
production
network
and
people
are
actually
really
accessing.
At
the
same
time,
the
links
are
technology
link
technology
is
Wi-Fi,
so
there
is
directed
wire
between
the
actors
so
called
super
nodes.
D
D
It
provides
a
mean,
word
environment,
some
of
the
things
I
said
that
complicated
things
was
because
it
is
a
trial
and
I.
Come
to
this.
You
see
this
and
to
set
up
and
I'll
show
one
of
the
boxes
in
a
second
it's
because
they
have
parallel
connectivity.
We
do
because
this
is
a
field
trial
is
the
experimental
software.
We
have
normal
IP
routing
software
in
how
running
to
the
IP
over
ICN
one
and
that
learn
some
of
the
complexity.
D
So
we've
also
meant
to
make
sure
that
we
are
not
messing
too
much
with
people,
so
they
should
say
the
the
router
boards
we
are
using
in
in
the
trial
point-to-point
links
to
other
super
nodes.
So
these
these
are
the
the
the
distant
are
point-to-point
links
and
then
the
actual
point-to-point
links
to
the
access
points
and
we
have
two
models
of
deployment.
D
One
is
the
where
the
access
points
are
IP
devices
or
where
the
access
points
are
IP
over
ICN
devices,
it's
a
different
form
of
deployment
which
has
different
benefits,
which
is
why
we
try
both
of
them.
The
the
the
reason
why
you
see
always
the
everything
in
pair
in
in
threes
is
because
we
have
a
management,
VLAN
setup
if
you
have
an
IP,
only
a
VLAN
setup,
as
well
as
an
IP
over
IC,
and
that's
the
parallel
setup
we
just
have
to
provide
to
in
order
to
not
mess
with
people.
D
We
switch
in
a
few
seconds
from
a
40,
IP
or
I
see
and
if
our
trial
fails
we're
switching
over
in
a
couple
of
seconds
on
to
the
normal
IP
network,
so
they
the
households,
don't
really
quite
notice
something
and
then
we'll
repair
the
issue
and
we're
switching
them
back
all
right.
You
can
get
rid
of
all
of
that.
If
you
and
I
come
to
this
in
the
next
steps,
if
your
software
stable
enough,
you
just
remove
all
of
this
nonsense
all
right.
D
This
is
really
trial
stuff
and
that's
the
reason
why
you
know
this
took
some
time
to
do
yeah
the
compute
devices,
so
these
are
as
a
normal
commercial
super
router
boards
and
the
actual
compute
infrastructure
are
embedded
ad
devices
with
full
course
as
if
normal
x86
infrastructure,
on
which
we're
running
the
software
directly
yeah
I,
won't
go
into
these
ones.
So
it's
a
dualistic,
backbone,
IP
or
ICN
depending
on
our
boat.
D
The
ICN
backbone
is
purely
l2,
so
you
run
everything
straight
on
l2
and
I
can
give
you
more
on
this,
takes
about
20
minutes
longer
to
explain
that
the
households
are
attachable
either
the
AP
level,
and
that
means
that
you
know
every
household
is
spawning
of
an
actual
IP
or
each
household
has
an
IP
actually
built
in.
These
are
the
two
different
boats
I
mentioned
before
the
core
components
are
always
reach
of
a
yit
IP
management
connectivity
just
in
order
to
login
and
maintain
the
software.
D
So
what
are
the
next
steps
that
we
are
really
looking
into
now?
This
has
all
turned
out
to
be
much
more
complicated
and
the
reason
for
that
is,
if
you
actually
again,
if
you
deploy
this
in
real
life
of
actionability
communities,
it
does
take
significantly
longer,
so
the
triose
has
actually
have
been
cut
short
quite
significantly,
and
we
are
currently
in
discussions
with
the
community
that
goes
to
comment
again
right
before
to
actually
continue
and
help
them
to
get
off
the
ground,
with
leaks
to
a
an
extension
of
the
trial.
D
This
would
run
after
the
project
of
the
project
finishes
next
week,
and
we
made
a
commitment
to
the
community
to
continue
to
try
it
for
another
year
to
gain
insights
and
also
to
switch
the
software.
That
goes
back
to
the
comment
I
made
before
we
really
need
the
softest
individual
has
a
new
software
solution
and
we
would
like
to
replace
the
original
software
with
a
new
software
return.
D
Allah
also
allows
us
to
simplify
all
of
the
setup,
because
we
have
significantly
higher
trust
in
our
new
software
than
we
had
in
the
original
software
and
that
kind
of
like
makes
the
whole
VLAN
setup
significantly
better,
as
it
has
higher
stability,
better
security.
There
are
some
security
issues
with
the
current
setup,
because
it's
experimental.
So
if
you
would
really
switch
this
to
production,
you
would
get
rid
of
some
of
the
security
things
very
significantly.
We
also
want
to
plan
to
perform
planned
experiments.
D
Some
of
the
benefits
that
I
was
talking
about
before
they
do
require
some
planning
with
a
community.
For
instance,
some
of
the
benefits
that
we
have
is
in
the
the
community
here
likes
watching
football
events
and
not
telling
your
PC,
which
clop
it
is,
but
you
can
imagine
which
club
they
like
watching
me
live
and
that's
a
very,
very
particularly
expensive
service,
because
if
a
it
goes,
white
appearing
Li,
which
is
expensive
and
it's
usually
watched
wire
HLS
technology
is
speeding
on
HTTP
level.
D
G
D
B
H
D
The
cases
are
purely
failure,
so
we
have
watchdogs
in
all
of
the
software
components
and
we
switch
over
in
failure
cases.
I
said
it
takes
a
couple
of
seconds
to
do
that
and
that's
mainly
well
if
one
of
our
software
components,
as
you
know,
some
of
them
have
a
couple
of
issues
and
we
switch
over.
We
can't
the
soft
is
not
set
up
that
we
can
experiment
that
we
can
experiment
in
parallel.
We
had
to
run
a
trial
in
another
project.
D
Last
year
we
actually
had
powerless
setups
that
that's
even
more
expensive
to
do,
and
in
this
case
we
actually
bound
some
people
on
an
IP
netbook,
some
people
on
an
IP
or
ICN,
and
we
ran
experiments
in
peril
or
some
and
they
had
no
idea.
It
was
randomly
done,
I'm
it
tossed
a
coin,
and
then
we
looked
at
the
database
of
it,
but
they
were-
and
we
asked
them
questions-
that's
quite
interesting,
but
it's
actually
that's
a
very
complex
to
set
up
and
at
this
scale
we
didn't
want
to
do
that.
B
B
D
This
is
reality.
We
have
actually
done
a
number
of
simulator
scale
significant,
so
the
communities
actually
is
a
decent
size.
So
even
here
we
would
expect
to
be
there
still
one
of
the
project
deliverables.
This
do
that
actually
performs
the
socio-economic
analysis
on
some
of
the
friends
of
the
multicast
benefits
that
we
are
talking
about,
and
the
scale
is
similar
to
the
child
community.
If
your
scale
is
even
more
up,
we've
done
this
in
the
sister
project,
where
we
perform
simulations
of
significantly
higher
scale.
Austin.
B
I
D
They
say
similar
from
the
so
the
caching
work
is
very
similar
when
actually
Avanti
was
part
of
work
as
well.
I
want
the
it
was
fun.
The
partners
I
forgot
to
mention
before
so
one
day
say
it
comes
from
the
satellite
site
and
the
edge
caching
I
was
talking
about
before
is
very
similar,
so
they
approach
their
original
education
solution,
be
improved
on
the
education
solution,
but
then
also
went
further
by
actually
looking
into
entire
service
placement,
so
not
just
content,
but
the
entire
service
is
pre
placed,
so
it
takes
it
on.
D
B
B
J
Over
to
you,
hello,
this
is
my
first
time
in
the
guy
a
meeting,
and
this
is
a
vivid
community.
Now
I'm
sure
there
is
Emma
Douglas
coming
from
Shanthi
hi
I'm,
with
a
a
scenario
search
sander
and
Innovation
Center
and
I'm
going
to
present
you
actually
research
directions
in
the
in
the
human
world
project
which
started
three
years
ago
and
is
going
to
be
concluded
in
two
months
from
now.
One
month
from
now.
Actually
the
main
objectives
of
the
project
were
to
develop
a
consolidated
information.
J
E
J
Led
to
multiple
research
directions
that
I'm
going
to
present
and
other
the
objective
was
to
provide
an
architectural
support
for
the
network.
Heads
drive
laden
a
towards
a
communication
platform
for
universal
coverage,
focusing
on
remote
areas
or
disconnected
areas
and
drive
along
the
way,
new
application
models
and
services
from
a
high
level
perspective
that
the
mobile
domain
starts
where
they
either
in
domain
the
end,
and
they
our
focus
was
actually
the
other
one
was
to
create
a
networking
platform
that
will
facilitate
communications
within
community
without
the
need
to
communicate
with
a
with
some
centralized
services.
J
J
So
the
what
we've
done
is
was
to
try
to
exploit
all
communication
opportunities,
try
to
incorporate
DTN
in
order
to
support
disruptive
communications,
actually
supporting
devices
that
may
be
disconnected
in
space
and
in
dive,
facilitate
user
and
service
mobility,
create
and
mechanism
in
order
to
support
application
data
and
computation
sharing
and
create
routing
routing
mechanism.
For
the
for
opportunistic
neural
networks,
which
which
is
based
on
social
based
routing,
actually
social
based
matrix,
the
apart
architecture
is
depicted
here.
The
blue
boxes
are
native
and
the
end
name,
data
name
definite
working.
J
J
Some
of
these
here
in
terms
of
forwarding,
we
have
created
a
DTN
interface
for
the
end,
the
end
platform
to
provide
its
reach
ability
and
reliability
when
necessary.
We
have
done
this
protocol,
which
is
called
opportunistic
of
past
Condon.
Discovery
weeds
can
be
used
in
AI
in
a
remote
decentralized
network
where
a
new
table.
J
We
have
worked
on
this
opportunistic
part
of
the
NBN
platform.
These
are
some
modifications
on
the
basic
Indian
plateau,
a
platform
in
order
to
facilitate
communications
in
opportunistic
scenarios
where
connectivity
may
not
be
so
good.
We
are
working
on
the
dagger
protocol,
which
has
a
draft
in
the
RTF
community
with
our
partners
in
and
code
labs.
Portugal
also,
we
are
with
regards
to
the
context
contextualization,
who
we
are
employing
social
metrics
in
order
to
improve
data
dissemination.
This
is
work
from
work
from
our
partners
again
portal.
In
addition,
what's
route
inoko
clubs
and
censorship.
J
J
Now,
regarding
the
we
provide
two
applications,
we
have
the
keyboard
based
mobile
application
sharing.
This
is
the
mechanism,
an
API
that
will
allow
applicative,
allows
applications
to
to
share
the
data
so
that,
if
you're
in
this
connected
environment-
and
you
don't
have
you-
have
access
only
to
an
access
point
or
don't
have
even
access
to
an
access
point,
but
only
access
to
other
nodes,
you
can
use
an
application
which
can
be,
which
is,
must
be
compatible
with
other
applications
to
exchange
application
and
computation
data.
C
J
And
migration,
this
would
be
the
new
mobile
platform
as
a
whole,
meaning
that
we
have
an
area
which
could
be
a
mobile
area
with
hot
spots,
along
with
a
hot
spots
or
in
this
area
we
could
have
also
a
mobile
user
service,
which
is
based
on
a
smart
phone
which
is
actually
located
in
this
mouthful.
What
this
can
be
in
this
allows
communication
between
end
users
and
also
between
the
end
user,
Center
divided
area,
and
we
also
are
close
to
the
base
base
network
through
the
immobile
service
manager,
which
can
move
services.
B
F
J
F
B
K
L
Question
hi
yeah
you've
also
talked
a
bit
about
receiving
data
that
someone
had
already
received
from
the
wider
internet,
but
had
a
cache
copy
of.
How
do
you
plan
to
validate
that?
That
data
is
actually
the
same
as
the
data
that
the
I
mean
how
you
gonna
validate
signatures
and
all
that
sort
of
thing
on
these.
J
L
J
L
J
M
E
J
J
N
M
B
B
G
P
I'm
just
going
to
talk
shortly
in
the
next
five
minutes
about
our
experience
with
a
mesh
networking,
so
this
is
EMP
mesh
network,
which
is
a
subset
of
community
network
located
in
the
city
of
Barcelona.
As
as
many
of
you
know,
if
he's
the
one
of
the
world
is
the
largest
Community
Network
were
part.
So
basically
can
be
it's
a
urban
community
network
of
people
given
at
located
in
the
Barcelona.
It
has
around
80
nose,
distributed
in
the
center
of
location
in
the
stands
district
of
Barcelona,
and
there
are
like
to
speak
place.
P
Let
up
connecting
these
users
to
the
internet
right.
We
have
a
monitoring
service
which
is
running
in
the
network
at
the
monitor
of
the
service
for
the
last
five
months,
and
we
try
to
find
patterns
regarding
different
metrics
right.
It's
a
production
network.
More
than
200
people
are
using
this
network.
So
here
you
can
see
some
of
the
what
we
say:
outdoor
routers,
which
users
are
using
basically
to
build
point-to-point
links
between
them.
You
can
see
some
nano
station
and
five
and
three
devices
so
was
to
analyze
the
network
from
the
local
services
perspective.
P
P
Basically,
we
wanted
to
know:
does
the
topology
follow
some
pepper?
How
does
it
grow
right?
So
it
started
from
this
situation
when
we
have
like
30
nodes
to
a
situation.
We
have
80
nodes.
So
with
time
it
became
a
full
dimension
effort
so
one
so
we
we
wanted
to
predict
the
growth,
but
we
saw
that
the
growth
is
unplanned
totally
unpredictable
in
this
manner.
Right
so
yeah,
it
is
a
fully
mesh
network,
it's
becoming
fully
mesh
network.
The
next
thing
that
we
wanted
to
see
was
the
node
availability,
basically
how
our
nodes
available
or
not.
P
So,
basically,
when
I
say,
availability
is
the
which
ability
of
nodes
in
our
monitoring
system
we
saw,
the
25%
of
the
nodes
are
less
than
90%
of
the
videos
in
less
than
90%
of
a
low.
So
this
was
one
metric
to
include
you
know
heuristics
right
and
the
most
important
thing
was
the
bandwidth
we
wanted
to
see.
What
is
the
performance
like?
Is
it
possible?
P
So
we
characterize
the
bandwidth
of
the
of
the
ladies
from
this
five
months
area
and
we
saw
that
there
is
a
high
risk
skewed
them
in
distribute,
wrap
50%
of
the
links
in
the
network.
They
have
less
than
10
megabit
per
second
and
the
other
50
from
200
megabit
per
second.
So
what
was
the
reason?
So
we
got
like
I
mean
the
it's
rather
be
even
better
than
the
orange
connectivity
Falana.
So
then
we
want
to
see
the
reason
why.
P
P
P
P
Nodes
which
are
the
nodes
where
the
services
are
deployed
right,
so
some-
and
this
is
the
this-
is
the
MP
18
based
on
the
mystic.
We
went
home
by
home
to
these
community
users
and
we
deployed
raspberry
paths
in
their
homes
and
now
Amazon
is
going
to
talk
how
we
deploy
our
framework
in
this
raspberry
pass.
Thank
you.
K
E
K
K
K
Waiting,
so
actually,
this
is
a
I
work
with
Maynard's
as
well.
So
basically,
what
we
try
to
do
like
to
understanding
the
characteristic
of
the
container
working
cofee
and
we
try
to
define
what
is
some
kind
of
requirement
that
we
should
design
the
edge
computing
platform.
Okay,
my
is
coming
okay,
so,
as
we
see
from
the
minim
slide,
like
local
services
is
going
in
continued
worldwide,
so
it's
some
kind
of
the
need
that
we
need
to
provide
a
service
close
to
the
user
as
possible.
K
So,
however,
you
look
into
the
platform
that
we
have
right
now
we
have
the
edge
computing,
which
is
mostly
related
to
the
data
center
environment,
where
you
have
they're
using
my
high
a
server
current
machine
and
they
use
like
a
heavy
weight
which
will
machine
that
and
moving
them
across
the,
so
it
can
winged
moving
them
across
a
server
but
still
inside
the
data
center,
and
also
the
fancy
that
is
quite
coos
as
well
like
they
have
a
really
reliable
clinic
city
and
also
a
high-speed
Internet.
Always
in
connection.
K
However,
look
back
to
the
what
we
have
in
the
complete
network.
We
have
a
mini.
A
limitation
and
concern
like
we
have
the
limited
bandwidth
to
exit
internet
and
then
that's
why
it's
gonna
be
very
difficult
to
provide
a
good
service
is
inside
the
community
itself.
That's
why
we
come
up
with
some
idea
that
why
not,
which
is
why
to
move
the
service
closer
to
you,
that
possible
and
the
time
to
the
other
it
advancement
of
language
so
nice
session.
K
That
I
think
you
might
know
about
that
like
we
have
unique
canals,
or
we
have
Dockers
that
allow
us
to
maker
so
is,
is
really
small
and
we
can
move
them
across
with
a
little
cost
and
also
finish.
We
can
try
to
overcome
internet
in
the
intermittent
connectivity
as
a
network
s
as
well,
and
this
is
some
kind
of
overview
of
implementation.
So
we
can't
pick
a
so
and
the
so,
as
I
mentioned
is
based
on
the
content.
The
doctor
container
base,
and
also
we
have
the
words-
is
important
in
Africa.
K
So
so
we
have,
we
implement
the
the
Sri
controller.
We
can
have
the
automatic
decision
how
to
make
to
decide
at
where
and
when
you
want
to
place
a
services
regarding
many
conditions
like
a
network
service
network
condition,
hybrid
resources,
quality
of
service,
and
so
in
the
agreement.
However,
to
support
decision-making.
We
need
to
build
reliable
marine
systems
as
well
like
how
to
collect
the
data
in
terms
of
the
Nord
user,
our
level
CPU
memory
and
so
on,
on
equal
condition
and
also
one
particular
thing
and
14
for
the
offical.
So
it's
different
form.
K
Another
issue,
completed
form
is
about,
is
not
forwarding
so
in
here
with
the
with
the
context
of
the
mobile.
We
integrate
the
name
data
work
in
the
end
name,
return,
working
and
also
delayed
for
a
network
as
well
to
overcome
the
challenge
of
the
interim
intermittent
connectivity,
is
konley
network
and
also
in
the
emergency
situations
as
well.
So
this
is
the
architecture
of
you.
Picasso
I
might
not
go
to
detail
for
that,
because
this
would
be
contact,
but
we
also
submit
the
papers
to
the
confident,
but
are
they
the
paper
should?
K
K
One
minute
left
so,
but
this
is
like
a
solve
architecture
that
we
feel
I
might
skip
this
one,
and
here
you
see
slide
last
November
we
went
to
goofy,
it's
the
help
eternally
indoors
as
well,
so
we
try,
we
try
to
deploy
and
test.
Our
system
voice
is
how
it's
working
so
I've
met
men.
Enough
mentioned
that
we
have
run
summer
garden
called
baths.
Try
to
select
what
could
be.
There
are
typical.
K
Urban
Eliot
of
Barcelona-
and
this
is
a
location
at
the
end,
we're
now
able
to
the
point
tending
of
the
SEC
to
across
the
and
then
we
run
some
experiment.
So
the
first
thing
that
we
try
to
looking
to
the:
how
can
we
improve
the
quality
of
service
so-
and
here
it
is
some
some
of
this
or
that
we
have
like
a.
K
We
can
improve
the
latency
that
the
user
can
exit
or
so
is
faster
and
also-
and
this
is
like
the
cost-
and
also
looking
to
the
the
network
services
as
though
that
how
fast
that
you
can
deliver
the
services
to
the
edge.
So
we
compare
our
polish,
because
so
the
classic
IP,
unicast
and
elephants
ela
become
so
actually
they've
used
a
lot
of
latency
because
we
can
benefit
from
the
caching
and
then
there's
nothing.
Ok,
at
the
end
and
important
thing
we
are
so
measuring
the
traffic
on
some
chances.
K
Well,
when
we
decide
services
how
efficiently
the
Picasso
can
give
you
the
traffic-
and
we
can
compare
to
the
IP
unipass
and
somebody
saw
I-
might
skip
its
financial
for
a
while.
They
sound
so
ok
at
the
end.
So
I
would
like
to
thank
also
lion-o
and
the
goofy
people
as
well
from
new
PC,
because
carrot
a
lot
in
terms
of
deployment
right
now,
departments.
K
R
P
R
G
P
M
P
S
P
Service
we
take
all
34
thousand,
knows
they
databases
and
select
the
type
of
services
that
people
use.
The
first
service
was
distributed.
Scott
must
use
service
in
the
network
right,
so
this
was
and
we
tried
to
find
open
source
version
of
this
to
select
our
labs
and
these
kind
of
things.
Second
months
ministry,
because
users
in
the
mesh
network,
they'd
like
you
to
stream
like
El
Clasico
games,
for
example,
we
were
trying
to
find.
P
F
B
K
E
K
B
And
for
those
of
you
that
may
know
dr.
Kanchana,
who
knows
runners
which,
within
the
past,
she
has
an
interesting
project,
the
dumbo
Network
yeah.
Is
that
still
running
yeah?
So
if
you
go
to
the
Thailand
meeting,
there's
a
great
project
where
she's
using
mesh
with
elephants
and
others
in
the
upper
regions
seriously.
B
S
Well,
and
now
for
something
completely
different:
actually
we're
going
to
see
the
same
things
but
from
a
zoom
out
perspective
perspective.
Let's
see
about
the
social
aspects
of
all
this
technology
that
you
people
here
are
building
so
I'm
going
to
talk
about
our
network.
It's
a
community
network
called
seventh
apologia,
which
is
based
increase
and
I'm
vasilis
resource
just
a
few
words
about
me
so
that
you
know
who
who's
speaking
I'm
an
engineer,
a
mechanical
engineer.
S
Actually
I
am
an
entrepreneur
I'm,
an
open
data,
evangelist
and
I'm,
a
member
and
administrator
of
the
seventh
opera
gotcha,
our
community
network.
So
7w
is
a
village
in
the
same
in
central
Greece,
it's
next
to
Olympus
mountain
and
you
can
see
it
over
there.
When
we
started
our
network
in
2010,
there
were
no
telecommunication
companies
there,
so
people
did
not
have
an
opportunity
to
access
Internet.
S
So
we
are
talking
about
the
rural,
isolated,
mountainous
area
and
a
group
of
people
stemming
from
silent
opera
village
decided
that
they
wanted
to
change
this
and
they
built
the
first
mesh
network
in
the
village.
It's
a
volunteers,
driven
endeavor
and
soon
after
that,
villages
from
all
around
surround
apparel
from
the
area
wanted
the
same
thing
to
happen
for
them
as
well.
S
We
have
a
nonprofit
organization,
it
was
founded
in
2013.
Our
vision
is
actually
to
create
opportunities
for
people
to
stay
in
their
birthplace,
because
Greek
villages
are
some
villages
from
all
over.
The
world
are
being
abandoned.
Our
young
people
flee
fleeing
to
urban
centers
because
they
don't
have
opportunities.
So
we
would
like
to
do
something
to
change
that.
Our
mission
towards
that
region
is
to
eradicate
the
digital
divide
and
provide
local
communities
with
equal
opportunities
to
access
digital
economy
and
citizenship.
S
So
this.
So
on
top
of
all
that
networking
numbers,
we
have
a
backbone
network
which
consists
of
24
backbone
nodes
connecting
today,
11
villages,
3
farms
and
one
camp
and
40
point-to-point
connections,
and
we
have
95
access
points.
These
are
access
locations
in
the
villages
and
more
than
almost
50
active
local
community
members.
These
are
actual
people
living
in
the
villages
who
are
building
and
maintaining
their
own
community
network.
These
are
people
we
work
with.
In
order
to
be
able
to
run
the
network.
S
S
F
P
S
S
No,
it's
monkeys,
monkeys
is
his
name,
so
this
is
a
local.
So
should
we
have
in
a
very
much?
This
is
how
we
work.
Actually,
this
is
how
we
provide
the
support
to
the
locals.
We
have
a
map,
we
draw
the
position
of
the
equipment
and
we
say
here
it
is
a
link
that
can
be
improved.
You
can
see
with
orange
color
and
then
people
will
go
and
set
it
up
and
it
will
work
fine.
We
provide
training.
S
Our
main
challenge
is
the
distance
and
communication
with
local
people
because,
as
I
said,
it's
a
five
kilometer
distance
from
500
kilometer
distance
from
Athens.
So
we
try
to
build
communication
channels.
We
have
achieved
that
by
using
popular
application,
so
yeah
I
don't
want
to
negate
that
machine.
That
was
here
true
anyway.
So
our
goal
is
to
empower
local
people
to
build,
maintain
and
expand
their
own
network.
So
we
don't
want
to
do
it
for
themselves.
We
want
to.
S
We
want
them
to
be
able
to
pollute
themselves,
and
we
have
been
very,
very
thankful
to
be
funded
by
the
internet
program
of
AIESEC
in
order
to
achieve
this
for
2018
and
2019
and
not
started
they.
Actually,
we
have
this
workshop
in
village
called
Flamborough.
We
taught
them
how
to
make
an
Ethernet
cable,
how
to
change
the
IP
settings
in
their
computer.
We
are
talking
about
people
who
are
farmers.
S
S
This
is
so.
This
is
a
euros
explaining
how
a
point-to-point
link
works,
and
this
is
hilarious
and
the
meat
is
here
who
are
building
the
equipment
so
that
they
can
also
look
at
that,
how
it
looks
and
how
they
can
make
it
afterwards.
As
you
can
see
here,
most
of
the
people
are
over
50
years
old
and
they
are
farmers.
S
So
one
would
wonder:
what's
going
on,
is
it
possible
that
these
people
will
go,
and
you
know,
build
the
community
network
like
make
links
and
work
with
IPS
and
work
with
cables,
and
why
would
they
want
to
do
that
in
first
place,
since
many
of
them
do
not
even
use
internet
yeah?
Well,
there's
one
very
basic
reason
for
that:
in
order
to
have
the
grandchildren
visit
them
in
the
village,
they
have
to
have
internet.
If
you
don't
have
the
grandchildren
won't
come.
S
C
S
S
S
So
it's
all
about
building
a
group
building
a
team
being
part
of
the
same
team
and
we're
also
social
events
to
facilitate
interaction
between
the
villages,
because
these
villagers-
it's
not
forgive
for
it's
not
given
that
they
will
know
each
other
or
they
will
interact
with
each
other
just
because
they
have
in
the
same
region.
Many
of
these
people
did
not
use
to
know
each
other
before
and
now
they
are
a
group
that
is
developing
this
network.
S
This
is
how
it
looks
the
support
that
we
are
providing,
so
they
will
ask
what's
happening
here.
Okay,
then
you
can
check
this
area
or
you
can
check
here
and
here-
and
this
happens
in
real
time.
This
is
a
regular
day
of
communication
with
the
community.
We
are
trying
to
celebrate
our
success.
Everything
is
green.
Everything
is
working,
fine.
We
are
trying
to
provide
support.
We
are
trying
to
provide
update
of
the
progress
that
we
make
so
that
everybody
shares
the
community
spirit.
S
So
Wi-Fi
and
internet
connectivity
are
really
really
important
for
these
people.
It
has
to
have
relevance
with
their
everyday
lives.
So
this
is
why
I
asked
for
the
services
before,
because
we
cannot
just
go
there
and
just
deploy
some
services.
We
have
to
know
what
it
is
that
these
people
can
use
and
what
it
is
that
these
people
need
this.
My
time,
ok.
S
So,
for
example,
this
is
a
agricultural
community.
They
need
tools
for
their
everyday
everyday
job.
This
is
what
we
are
trying
to
build
with
them
and
something
that
very
important
learning
about
computer
networking
helps
build
awareness
and
privacy
and
personal
data.
In
this
workshop,
that
I
told
you
last
Saturday.
When
we
were
explaining
about
how
the
controller
the
access
layer
controller
works,
then
one
of
the
participant
turns
to
another
and
said:
oh,
they
are
watching
everything
we
said.
Yes,
this
is
how
internet
works.
This
is
this
is
the
reality
so
yeah.
S
We
also
see
that
people
when
they
are
supported
and
informed,
they
don't
get
frustrated,
and
this
is
really
important
in
the
community
networks
and
they
really
feel
proud
to
contribute
and
built.
They
feel
it
that
their
own
infrastructure
grow.
What
happens
after
that?
Well,
this
is
the
magic
there
was
a
local
riding
club
who
asked
to
the
incubate
I
want
to
have
internet
connectivity
and
they
said.
Okay,
you
are
off
the
grid.
S
S
Our
older
members,
older
community
members,
helped
the
newer
the
newcomers
and
now
they're
even
organizing
their
own
workshops
without
us
in
the
winning
at
all.
So
it's
taking
a
live
one
of
its
own.
This
community
they
participated
yeah
the
women
you
show
them
before.
We
are
developing
a
farmers
log
application
through
Europe
European
funded
program,
which
is
called
net
Commons,
which
is
really
really
important
for
what
they
do.
It
can
be
a
really
important
tool
for
these
people.
S
Yeah
telegram
application
has
helped
us
very
much
to
keep
in
contact.
We
have
the
really
important
debate
with
these
people
about
the
data
that
they
produce
and
they
somehow
they
have
built
awareness
on
the
value
of
this
data
and
of
who's
managing
and
who's
owning.
This
data,
which
is
a
really
really
big
issue.
We
didn't
expect
that
they
will
be
so
advanced
in
thinking
about
this
stuff,
but
it
came
up
and
we
were
very
glad
that
it
happened
so
yeah
and
the
latest
news
is
that
we
have
had
in
the
village.
S
We
have
had
a
crowdfunding
from
from
people
of
the
village
to
buy
a
an
access
point
for
one
of
their
fellow
villagers
who
is
disabled.
They
wanted
to
support
here,
support
him
that
way
and
they
bought
it
and
put
it
in
place
there.
Well.
This
is
enabling
exciting
stuff
to
happen
in
energy
in
an
area.
Just
imagine
that
the
visiting
doctors
in
the
villages
could
not
prescribe
medicine
because
it
couldn't
have
access
to
the
online
system,
and
now
they
can
use
out
networks.
S
They
do
so
that
meant
that
people
who
would
have
to
travel,
30
kilometers
to
the
nearest
city
to
get
their
medicine
prescribed
right
and
we're
enhancing
social
cohesion.
The
way
I
told
you
before
so
the
grandparents
have
their
grandchildren's,
visiting
them
and
we're
strengthening
the
citizenship
by
providing
access
to
the
dual
public
services.
We're
are
organizing
new
workshops
throughout
the
year.
We
are
planning
to
share
our
know-how
with
some
other
community
in
some
other
place,
because
we
believe
that
this
is
how
it
works.
E
N
S
Thank
you
questions
concerning
our
funding.
It
has
it.
We
have
various
revenue
streams,
so
one
is
through
programs
like
funding
programs
of
European
Union's.
Another
is
through
organizations
such
as
acts
such
as
I
soaked.
That
is
a
happiness
with
some
funds,
but
also
local
people.
The
the
node
owners,
as
they
are
called
they
are
contributing
a
fixed
amount
of
money
which
is
like
60
euro
per
year
to
cover
for
the
maintenance
costs
and
yeah
the
the
other
pillar
is
that
we
do
a
lot
of
volunteering
work.
So
everybody
is
volunteering
here.
S
We
don't
have
any
professionals
working
on
that
still,
and
the
second
part
is
that
we
have,
let's
say,
hybrid
model,
our
the
core
team,
as
we
call
it,
which
is
our
organization
as
an
overview
of
the
operation
of
the
whole
network.
So
it's
very
centralized
overview
of
if
it
works
correctly
like
access
to
the
controller,
and
then
when
we
see
that
something
is
not
working
right,
then
we
will
contact
the
local
team,
the
local
group
in
the
village,
and
ask
them
to
go
in
and
intervene
so
that
we
can
fix
that.
S
The
other
way
is
that
they
are
complaining,
so
they're
writing
in
the
telegram
saying
yeah.
My
access
point
is
only
10
megabyte
per
second
10
megabit
per
second,
so
something's
wrong,
and
then
we
will
work
with
them
and
bring
it
up
to
to
speed
and
very
yes,
we
have
a
unique,
let's
say
help
here.
We
are
connected
to
the
local
University
of
the
nearest
city,
so
they
are
providing
us
with
the
back
hole
and
they
are
giving
it
as
a
social
responsibility
towards
local
villages
towards
the
local
community
towards
people
who
cannot
access
internet.
K
I
should
leave.
My
question
is
related
to
the
first
question
of
Louise,
but
I
might
are
a
bit
more
further
like
in
terms
of
sustainability.
You
say
that
Nadia
subsidized
internet
connection
right
to
the
village
so
and
also
the
the
related,
also
sharing
some
cost
as
well
right.
So
my
question
is
what
about
the
long-term,
for
example
like
if
some
relator
decided
to
quit
for
the
member
and
you
might
lose
some
of
your
the
user
who
pay
right?
So
what
is
your
idea
about
how
to
yeah.
S
We
haven't
solved
the
business,
let's
say
the
social
business
model
question
yet,
but
it's
an
ongoing
process.
We
believe
that
the
more
you
engage,
the
local
community,
the
more
they
will
support
it.
So
now
we
are
receiving
support
from
many
people.
Everyone
who
has
an
access
note
in
his
house
will
contribute
with
steady
amount
of
money
each
year
and
we
also
do
with
fests
local
fests
and
we
cover
some
contributions
from
there
as
well.
S
K
U
Rich,
thank
you
from
jangula,
just
question
about
your
workshop
and
how
you're
teaching
people
about
the
basics
of
network
building
and
basic
concepts,
so
two
questions
both
linked
to
each
other.
One
is
what
are
the
areas
that
people
had
greatest
difficulty
with,
say:
IP
addressing
or
whatever,
and
secondly,
how
close
are
you
to
I
mean?
How
has
your
model
been
replicated
by
nearby
communities
and
other
similar
communities
and
and
getting
these
skills
to
spread
is?
Is
the
important
question
to
make
something
kind
of
that
can
grow
quickly?
So
how
is
you
to
that
mm-hmm.
S
Okay
concern
me.
The
first
question
thinks
that
they
cannot
see
like
the
they
cannot
visualize.
They
cannot
comprehend,
because
these
are
people
who
are
not
experts
on
technology.
So
we
find
it
quite
difficult
to
understand,
for
example,
the
network
architecture,
the
the
backbone
there,
the
access
layer-
these
are
things
that
confuse
them.
So
that's
why
we
try
to
visualize
it
with
a
map
and
the
tokens
and
yeah.
If,
if
you
go
deeper
into
more
advanced
networking
concepts,
then
we
lose
them
there.
S
It's
really
really
difficult
to
work
with
that,
and
this
takes
time
to
build,
but,
let's
say
90%
of
the
problems
that
our
network
has
can
be
solved
with
basic
knowledge
on
how
to
make
a
cable
or
how
to
align
the
links
or
how
to
put
it
in
the
right
position
and
the
right
way.
The
second
question
was
how
to
replicate
what
we
do.
It's
really
really
important
for
us
to
let's
say
package,
our
knowledge
and
experience
and,
let's
say,
export
it
or
transfer
it
to
other
areas.
S
It
hasn't
happened
yet,
and
it's
really
important
for
us
that
this
summer
it
will
be
the
first
time
that
we
will
go
to
another
village
along
with
people
from
our
villages
and
stay
there
for
three
days.
Do
the
workshops
build
the
first
mode
with
them
and
try
to
teach
them
how
to
do
it
themselves?
But
it's
really
important
that
you
create
connections
so
that
after
you,
after
you,
you're
gone
after
you
leave,
they
don't
feel
that
they
are
on
their
own.
B
V
I'll
be
superfast
cuz
I.
My
question
overlaps
a
bit
with
that
one
I
was
curious
about
the
engagement
you
get
from
that
large
bunch
of
people.
The
time
do
you
find
that
maybe,
after
a
couple
of
years
or
less,
you
become
very
highly
dependent
on
one
or
two
very
engage
participants,
and
in
that
case,
there's
kind
of
a
single
points
of
failure,
move
away
from
being
the
infrastructure
and
towards
the
individuals,
and
if
that
happens,
to
be
someone
who
leaves
or
commonly
dies
does
everything
fall
to
pieces?
V
S
Have
we
have
we
are
here?
We
are
today
after
many
years
of
intervention
in
in
the
region,
so
we
have
worked
with
many
people.
People
actually
have
come
and
have
gone.
We
renew
the
human,
the
human
resources
that
we
have
and
we
see
that
in
each
village,
in
each
village
there
is
always
one
or
at
most
two
champions
the
people
who
are
most
militant
and
they
will
go
and
put
everything
and
move
inspire
other
people
to
do
so.
S
These
are
not,
let's
say
unique
people
I
mean
if
somebody
leaves
then
somebody
else
will
eventually
take
his
place,
not
very
not
very
soon,
but
there
will
be
somebody
and
it
takes
a
lot
of
effort
from
our
side
to
be
there
and
to
continue
building
the
community
and
yeah.
This
is
not
something
that
you
can.
You
know,
let's
say
securing
for
100%,
because
what
we
do
is
like
90
percent
social
and
perhaps
ten
percent
technical.
So
you
have
always
human
relations
to
work
with
Thanks.
S
B
Q
T
How
much
calcium
from
university
of
padova
working
a
pitch
decent
worker?
Well,
that
was
my
hitch
Mirena,
so
today,
I'm
talking
about
our
recent
studies
about
using
T
white
space
as
a
black
hole
for
a
cellular
network
over
some
deployment
and
highland
in
Scotland.
So,
as
we
already
know
that
almost
fifty
two
percent
of
the
population
worldwide
are
still
doesn't
have
internet
connection,
which
is
more
than
50
percent,
more
than
half
of
that
population
worldwide.
T
So
small
least,
these
figures
are
more
related
to
each
other,
meaning
that
this
50
percent
that
offline
people
are
most
of
them,
are
likely
living
at
the
ruler
area.
So
why
provide
the
connectivity
for
all
people
in
rural
area
are
are
challenging
it's
mainly
for
to
for
two
main
reason.
So
the
first
reason
is
the
infrastructure
cost.
So
from
the
operator
perspective,
it's
not
very
economical.
T
There
is
no
any
gain
from
providing
deploying
a
very
high
cost
infrastructure
when
we
came
very
minimum
revenue
or
or
or
something
that
covered
the
coast.
So
this
this
del
Matt
between
how
much
I
pay
and
then
how
much
I
get
back,
meaning
that
preventing
that
the
actual
operator
from
doing
this
this
deployment,
so,
but
why?
T
While
there
is
no
much
revenue
in
this
area,
it's
mainly
for
for
two
reasons:
first
reason
that
either
the
people
in
this
area
are
very
sparse
are
not
really,
maybe
you
find
find
one
or
two
houses
distance
between
them,
like
one
kilometers
or
something
Oh,
either
they
are
low-income
people
living
there
solo.
This
lead
us
to
that.
The
second
problem,
which
is
affordability.
So
if
the
people
living
in
rural
area
has
a
low
low
income,
then
asking
them
to
propane
have
a
high
monthly
subscription
for
the
Internet
connectivity
is
not
very
helpful.
T
T
Only
two
percent
of
premises
in
UK
they
have
only
they
can
have.
We
can
have
only
a
10
megabit
period,
less
than
10
megabit
per
second
broadband
speed.
So
the
problem
is
not
just
a
problem
of
developing
countries
is
still
a
major
barriers
in
rule
at
measure.
A
rule
Araiza
areas
worldwide
facing
this
problem
of
low
speed
or
non
connectivity.
T
T
So,
but
what
work
is
made
most
of
what
is
missing
now,
so
in
this
work
we
propose
re
designed
for
this.
For
this
ruler,
cellular
connectivity.
We
thought
that
this
design
preferences
print
prints
principles
are
not
yet
recovered
and
the
community
in
both
community
so
first
things,
simplicity,
so
because
it's
because
it's
a
community
based
infrastructure,
so
we
need
simplicity.
We
need
something,
but
in
play
that
the
community
themselves,
that
can
they
can
go
and
plug
the
device.
T
I
mean
the
access
device,
which
is
could
be
either
either
Ruto
or
could
be
a
base
station
small
base
station
and
then
and
that's
it
and
then
everything
it's
work.
Fine
second
thing
a
scalability,
so
how
we
can
scale
scale
this
up.
So
if
we
start
by
10
years
on
how
we
can
does
this
is
scalable,
can
we
go
for
forty
four
hundred
and
but
not
just
less?
Qadian
is
capability
in
terms
of
the
number
of
user,
but
also
in
terms
of
the
services
I
can
provide.
T
So
if
I,
if
I
can
starting
for
it
start,
for
example,
by
10
megabit
per
second
speed,
can
I
go
400
just
this?
Is
the
stability
we
mean
from
in
this?
The
third
thing
makes
the
applicability
for
a
new
services.
So
I
will
talk
about
this
remote
it
is,
and
in
the
coming
slides
falses
is
a
cost-efficient
should
for
sure
glad
to
need
neither
because
the
whole
the
whole
objective
of
less
that
we
cannot
have
a
commercial
operator
operating
operating
in
this
rural
and
this
area.
T
T
The
second
part
is
TV
ad
space,
backhauling
link
from
that
from
the
location,
but
to
provide
which
is
carried
at
traffic
of
the
access
point
or
all
the
access
network
to
the
put
on
to
the
internet.
The
third
part,
which
is
the
cool,
because
it's
the
cellular
networks
who
need
a
cool
part,
cool
part,
meaning
Mme
and
a
PC,
which
is
we
implemented
by
couple
by
cooperation
with
Microsoft
cool
cool
cool
in
the
cloud,
but
also
because,
if
there's
no,
not
a
lot
of
time,
but
this
word,
it
is,
is-
are
in
our
paper.
T
So
before
before
we
we
went
to
the
field,
we
do
some
analysis
using
a
splat
software,
which
is
a
software
that
used
for
for
a
train
for
a
for
connectivity
for
availability,
analysis
and
it
consider
the
train
and
the
shape
and
and
weather,
and
these
these
type
of
things.
So
we
select
an
area
in
Highland
in
Scotland,
which
is
an
area
at
like
60
kilometres,
some
60
kilometers,
and
we
do
our
analysis
in
this
area.
So
we
mainly
focus
on
into
question
cook
two
questions.
T
T
The
base
said
that,
but
when
I'm
trying
to
use
them,
deploy
actual
middle
mile
or
backhauling
link
between
to
two
point
I'm
facing
a
problem
of
severe
interference,
receiver
side-
while
this
has
happened
because
the
receiver
side,
which
is
a
TV
ad
space
receiver,
it's
it's
suffering
from
different
interference
coming
from
different
primary
TV
transmitter
and
which
just
means
that
the
Dyson
are
level
at
this
receiver
is
very
low,
which
make
that
the
connection
was
that
prime
was
up
at
Eva's.
Restaurants,
hotels
is
not
possible,
so
the
main
difference
between
diverts,
miss
usability
and
divots.
T
Miss
availability
is
how
much
how
much
it's
about
the
qu
quality
rather
than
the
quantity,
so
that
channel
as
channel
is
X
has
a
snr
above
some
threshold,
which,
if
it
is
true,
then
this
channel
is
usable.
If
it
is
not,
then
the
Shannon
is
is
non
usable.
So
this
is
the
main
difference
between
TV
OTT
space
availability
until
he
was
first
usability.
Availability
is
using
a
coin
the
quantity
side.
How
many
are
there,
but
usability
are
using
that
the
quality,
how
many
can
be
used
actually
for
this
link
communication?
T
So
for
this
we
have
here
some
result
from
from
our
analysis,
so
so
the
graph
shows
the
difference
between
what
is
reported
from
that
TV
ad
space,
0
location
database.
We
use
the
Commission
data
is
called
first
spectrum
from
fair
spectrum,
and
then
we
did
some
analysis
about
either
this
or
I
will
are
actually
usable
or
not
by
usable
I,
mean
or
measure
this
and
our
level
on
these
channels
and
and
by
the
front
you
threshold,
so
5
DB
and
10
DB
and
20
DB.
T
We
see
that
you
can
see
that
the
for
a
median
for
a
50%
of
the
location,
the
difference
between
the
two
terms,
usability
and
availability,
is
around
200
megahertz.
So,
for
example,
the
database
is
reporting
that
there
are
30%
I
mean
30
channel
are
available,
but
the
actual
usable
Channel
are
just
five.
This
is
this
is
a
4/4
50%
of
the
location
for
a
second,
a
set
of
experiment.
I
said
of
analysis.
We
did.
T
It
shows
it's
suspected
fragmentation,
so
we
now
know
that
the
spectrum
is
available,
but
because,
because
it's
the
TV
channel
is
just
eight
megahertz
and
to
achieve
high
capacity
link
between
two
point
like
you
need
something
you
need
to
aggregate
some
spectrum
right,
so
so
I
mean
the
eighth.
The
eighth
McGirt
is
not
sufficient.
You
need
to
have
like
10
mega,
then
I
mean
like
20
and
20
megahertz,
40,
megahertz,
60
megahertz,
so
you
need
to
know
is
that
the
frequency
is
available,
contiguously
or
fragmented.
So
we
did
this.
T
This
study
to
figure
out
that
what
is
the
nature
of
the
spectrum
there
and
we
found
that
the
spectrum
was
still
fragmented
yeah.
We
could
have
30
20
10
hours
are
available,
but
they
are
not
available
available
in
one
chunk.
They
are
separate,
they
separated
by
some
non
free
channels,
and
we
found
that
for
a
50
percent
or
the
median
of
these
of
this
spectrum.
T
T
G
T
So
the
idea
of
this
deployment
is
not
about
the
distance
that
is
important.
What
the
ideas
to
achieve
the
high-capacity
link
that
we
can
go
from
eight
megahertz
channel
until
up
to
80
megahertz
channel.
So
we
started.
This
is
a
very
simple
payment
to
start
by
eight
McGuirk
channel
here.
That
here
are
the
based
in
world
space.
T
We
have
and
we
have
the
Internet
cabinet,
which
is
has
a
fiber
connectivity,
and
then
we
have
here
with
a
client
TV
white
space
which
is
in
this
area.
There's
no
any
connectivity,
and
this
is
the
backbone
link.
Also
you
also
here
we
have
LTE
base
station
small
base
station
that
provides
so
a
connectivity
for
a
for
a
4G
mobile
network
and
in
this
in
the
surrounding
area.
So
this
is
our
present
and
it's
just
an
initial
deployment.
T
H
Very
nice
presentation
really
good
results.
I
think
so.
I
get
a
couple
questions,
so
the
first
one
is
in
databases
models
most
of
the
time
overestimating
the
occupation
of
the
channels
in
the
areas
in
which
the
primary
users
are
deployed.
How
would
you
explain
that
you
are
finding
this
counterintuitive
result?
Okay,.
T
Basically,
the
table
the
database
is
focus
of
from
that
transmitter
perspective,
so
the
transmitters
and
its
location
to
the
database
and
then
the
today
is
supplied
by
a
list
of
available
channel.
But
in
our
analysis,
we
focus
on
the
receiver
side,
which
is
not
part
of
this
communication
of
the
database.
So
saying
that
if
I
I'll
fight,
for
example,
if
I
choose
sunshine,
helix
and
unlit
loud
primary
device
with
transmitter
to
transmit
by
by
this
channel
at
the
receiver
side,
it
might
be
that
the
case
that
this
channel
will
be
very
interfered.
Why?
T
Because,
because
maybe
this
this
receiver
location,
isn't
an
interaction
and
an
intersection
location
was
different.
Primary
transmitter
di
transmitter,
which
make
the
interference,
are
very
high
on
this
channel.
That's
that's
how
we
find
that
we
have
a
set
of
finances,
that
we
found
that
in
different
location,
that
there's
a
huge
gap
between
the
availability
using
divert
space
and
usability
have.
H
T
K
T
5G
contest
here
is
just
been
so
fab.
G
has
a
promise
of
having
a
very
high
gigabit
per
second
speed
and
low
latency
yeah,
and
that's
how
this
related
to
what
we
are
doing
now
we
are
in
this
lunar
area
are
using
4G,
still
a
commercial
devices,
and
then
we
have
this
capacity.
This
link,
which
is
8
megahertz,
so
to
provide
a
high,
a
high
bandwidth
for
these
people
in
this
area.
So
you
need
to
aggregate
multiple.
T
The
bottleneck
is
end
up
in
the
back
rolling
link,
so
we
need
to
aggregate
multiple,
TV
channel
so
from
from
here.
There's
a
link
between
what
5g
proposal
will
having
a
high-speed
broadband
and
what
we
are
trying
to
achieve
quite
right.
We
are
trying
to
solve
the
bottleneck
at
the
back
rolling
at
honing
link
to
aggregate
month
to
restrict
or
that
we
can
achieve
the
throughput
that
5g
promised
was
okay,
so.
K
One
question:
are
you
working
with
the
liquidators
or
something
like
that?
I
like.
K
K
T
E
U
If
5g
seems
almost
a
bit
redundant
here,
since
you
know,
you
have
point-to-point
technologies
that
can
do
I
mean,
for
example,
even
5
gigahertz
at
the
moment,
60
Hertz,
24,
Giga,
Hertz
and
many
parts
of
the
world.
It's
you
know
you
have
low
cost
commodity
equipment
based
on
you
know,
available
in
unlicensed
exempt
and
licensed
bands
that
can
achieve
the
kind
of
speeds
that
you
need.
I
mean
I,
think
in
5
gig
you
can
get
up
to
a
gigabit
per
second
and
60
gigahertz
and
24
gig.
You
can
get
even
higher
yeah.
T
U
Is
that
so
I'm
failing
to
see
the
relevance
of
5g
here
so
like
say
reaching
that
having
that
kind
of
propagation
with
5g
need
similar
kinds
of
spectrum?
So
you
know
you
would
need
you
know:
20
40,
60,
megahertz,
chunk
of
sub
1
gigahertz
spectrum
yeah.
Now
that
is
a
you
know,
precious
valuable
stuff
that
it's
being
snapped
up
by
mobile
operator
kind
of
world
right.
So
so,
and
but
if
that
was
available,
then
you
could
use
any
technology
in
there
to
achieve
that
kind
of
throughput.
T
N
T
B
I
400
point-to-point
links
about
10
gigabits
per
second
of
licensed
capacity,
another
10
of
unlicensed
capacity,
so
I've
done
a
lot
of
this
stuff.
From
the
commercial
perspective,
we
did
use
a
lot
of
open
source
technologies,
Linux
routers,
bgp
OSPF,
a
lot
of
that
stuff.
So
I
love
what's
happening
in
the
community
network
space.
In
fact,
I
was
inspired
by
mi
t--'s
roof
net.
I
To
start
my
business
way
back
then,
last
seven
years,
though,
I've
been
a
consultant
to
network
operators
to
governments
to
commercial
organizations
and
I
do
a
bit
of
training
for
network
startup,
Resource
Center,
who
send
me
places
to
teach
network
engineering,
Wireless,
engineering
and
IOT.
These
slides
were
developed
for
an
IOT
workshop
that
I
give
4n,
SRC
and
I'm
just
going
to
take
you
through
a
couple
of
protocols,
because
I
know
people
want
to
start
adding
IOT
to
their
community
networks.
I
So,
first
off
I
OT
protocols
exist
because
we
have
device
constraints,
we've
got
low
power,
we've
got
low,
CPU
we've
got
tiny
devices
and
we
have
network
constraints
because
IOT
devices
do
not
have
big
antennas
put
on
them.
You
don't
put
a
dish
antenna
on
an
IOT
device,
you
don't
put
it
on
the
roof,
so
you
get
clear
line-of-sight.
I
You
got
radio
power
utilization
because
a
lot
of
times
you
want
these
things
to
operate
on
a
battery
or
a
small
solar
panel.
You
have
interference
from
yourself.
You
have
interference
from
other
devices
and
you
have
these
ideas
that
you
might
want
to
have
itinerant
connectivity
or
mobility
of
this
device.
You
might
want
to
take
your
sensor
and
move
it
from
one
place
to
another.
These
are
not
things
you
do
with
an
antenna
that
you
stick
on
a
rooftop,
so
unfortunately,
fortunately
Wi-Fi
is
the
most
popular
iot
protocol
out
there.
I
The
Internet
of
Things
really
is
built
on
Wi-Fi.
Today,
what's
crazy
about
this,
is
you
can
get
a
Wi-Fi
module
and
a
microprocessor
on
a
system
board
with
an
operating
system
and
have
a
usable
device
for
seven
bucks
and
that's
buying
one
at
a
time
once
you
start
buying
a
thousand
of
them,
you
get
it
down
to
3
bucks.
If
you
buy
10,000,
it's
probably
2
bucks,
so
on
and
so
forth.
So
Wi-Fi
is
like
the
default
protocol.
I
For
connected
devices-
and
it
works
well
where
there's
power
and
Wi-Fi
coverage
but
doing
secure
mobility
with
Wi-Fi
is
quite
hard.
A
lot
of
people
when
they
talk
about
moving
Wi-Fi
sensors
around,
say:
oh
I'll,
just
latch
onto
an
unlicensed
network,
Richard
lamb,
formerly
if
I,
can
had
a
little
device
that
he
would
find
open,
Wi-Fi
networks
and
and
infiltrate
them.
That
was
cute
Richard
anyway.
I
Wi-Fi
does
not
solve
all
the
IOT
problems,
most
of
all,
because
it's
not
designed
for
battery
consumption,
but
the
great
thing
about
Wi-Fi
is
that
anybody
can
run
a
Wi-Fi
network
and
you'll
find
with
IOT.
This
is
not
the
case,
so
we
have
got
the
I
Triple,
E,
802,
15
4
and
whatever
series
of
protocol,
which
includes
igby
Bluetooth,
low-energy
6lowpan
I've
gone
to
two
different
research
groups
and
working
groups
this
week
about
6lowpan
frequencies,
868
megahertz,
915
2.4.
I
You
know
you're
just
talking
about
TV
white
space
a
few
minutes
ago
and
we're
talking
about
TV
white
space
because
the
frequencies
are
lower
than
2.4
gigs.
They
propagate
better
through
trees
through
difficult
environments.
So
getting
your
devices
on
UHF
frequencies,
low
frequencies,
like
8,
6,
8,
9,
15,
means
they're.
Gonna
have
a
lot
better
performance
than
2.4
gig.
I
You
may
have
anywhere
from
20
kilobits
per
second
to
a
megabit
per
second
of
traffic,
coming
out
of
your
IOT
devices,
IOT
devices
I
work
with
or
like
kilobits
per
second
at
the
most,
and
that's
like
a
couple
of
times
an
hour
anyway.
You
get
start.
I
Apologizing
that
go
to
the
working
groups,
low-power
consumption-
you
can
have
battery-operated
6lowpan
devices
that
may
last
a
couple
of
years.
If
you're
careful
with
the
power
management,
they
can
be
low-cost
if
they're
in
the
2.4
gig
band,
802
15
devices
in
8,
6,
8,
9
15
are
definitely
not
low-cost,
because
there's
no
economics
of
scale
there,
people
just
don't
make
enough
of
them
for
them
to
be
cheap,
but
2.4
gig
everything's
cheap.
So
there
is
encryption
128
bit
keys.
It
is
a
personal
or
local
area
solution
without
any
real
options
for
mobility.
I
If
you
build
a
6lowpan
network
or
you
build
a
ZigBee
network
or
a
bluetooth,
whatever
it's
going
to
be
for
a
small
area
and
it's
not
going
to
be
a
network
you're
going
to
build
across
a
number
of
communities
and
share
resources.
You've
just
got
a
bunch
of
little
islands,
but
a
great
thing
about
this
is
anybody
can
run
an
802
15
network,
anybody?
I
Ok,
we
have
some
really
bad
stuff
like
if
you
buy.
If
you
go
to
the
toy
store
and
you
buy
an
IOT
device
or
you
buy
it
off,
Aliexpress
or
Amazon,
or
whatever
you've
got
a
weather
station,
I
hate,
weather
stations,
cheap
weather
stations,
do
things
like
run
unencrypted
cereal
across
433
or
868
megahertz
or
9
fifteen.
I
Some
people
take
advantage
of
this
by
having
fun
and
capturing
the
information
making
it
useful.
Some
people
take
advantage
of
it
by
making
a
garage
door
opener
that
they
stick
on
the
roof
of
their
car
and
they
drive
down
the
street
and
they
open.
Everybody
is
garage,
as
they
drive
by
a
colleague
of
mine,
gave
a
talk
at
a
hacker
conference
that
how
he
did
this
in
New
Zealand.
I
That's
because
things
like
lo-fi
and
moti
know
based
on
the
RFM
69
w
chip,
which
is
like
pennies
for
the
chip
very,
very
insecure
in
most
cases,
but
it
is
very
inexpensive
if
you
want
to
buy
one
of
these
and
play
with
a
module
with
a
CPU
and
the
wireless
three
bucks.
Fifty
for,
like
one
yeah
pennies,
if
you're
buying
ten
thousand
or
a
hundred
thousand
of
them,
this
doesn't
scale
beyond
local
applications.
Yeah
I
guess
anybody
can
do
this,
please
don't
don't
don't
just
home
sick
fox
there's.
I
Is
there
anybody
from
sick
fox
here
in
this
room,
because
there
have
been
sick,
fox
people
in
in
the
research
and
working
groups
that
I've
attended
this
week?
Sick
fox
is
crazy
because
there
are
an
IOT
company
that
owns
the
like
the
whole
stack
they
own
and
operate
the
receiver
network.
They
own
the
protocol,
they
own
everything
about
it.
They've
been
very
successful
in
infiltrating
local
governments
and
utilities
in
selling
their
sorry
accessing
working
with,
I
didn't
mean
it
infiltrated
relationships.
I
They
have
a
cool
device
that
has
very
low
power
consumption.
It
was
designed
for
a
battery
operation,
its
limitations.
Are
you
only
get
140
messages
a
day
and
they're
12
bytes?
So
you
don't
have
a
lot
of
data
capacity.
It
works
out
to
10
to
a
thousand
bits
per.
Second
look:
that's
great!
If
you're
a
water
meter
or
a
power
meter
or
an
anemometer
or
something
that
has
you
really
only
need
to
talk
140
times
a
day
or
five
times
a
day.
That's
great!
You
can
do
payload
encryption.
I
It
is
possible
to
have
mobility
so,
like
you
can
roam
a
cig,
Fox
device
within
Europe,
because
it's
all
eight
six,
eight
megahertz,
you
can
roam
a
915
megahertz
device
between
American
country
countries
in
the
North
America.
Possibly
other
countries
that
have
9/15
like
Australia
and
the
thing
about
sick
fox
is
the
only
sick
fox
can
run
a
sick,
Fox
Network.
If
you
are
a
sick,
Fox
Network,
you
become
a
partner,
they
lease
you
the
base
station,
you
put
it
up
on
your
Tower
communities.
Do
this
small
wireless
operators
do
this,
but
it's
not
yours.
I
We
got
another
one
here
called
weightless
and
weightless
is
funny
because
it
was
designed
as
an
IOT
protocol
for
TV
white
space
and
I
got
involved
with
weightless
in
2012,
and
they
just
had
this
beautiful
protocol
to
do
very
low-power
a
battery
operated.
They
just
built
a
gorgeous
protocol
and
then
they
were
really
constrained,
because
only
one
company
was
making
the
chips.
I
This
company
called
Newell
and
in
2014
Newell
sold
themselves
to
hallway
and
then
hallway
took
the
intellectual
property
and
sort
of
shoehorn
that
into
n
B
IOT,
which
is
now
a
3gpp
standard,
and
a
lot
of
people
call
it
5g
I.
Think
technically,
it
will
come
out
in
a
release
before
5g,
but
people
are
calling
it
5g.
It's
it's
a
really
nice
protocol,
battery-powered
nodes.
I
You
can
go
from
bits
per
second
of
traffic
to
megabits
per
second,
so
you've
got
this
whole
adaptive
modulation
regime,
for
what
you
need
public
key
encryption,
mobility
scaling
to
international
networks.
Mobile
network
operators
will
be
running
if
they're
not
already
will
be
running
n,
be
IOT
on
their
existing
base
stations
and
existing
antennas.
Just
by
adding
a
software
load
to
their
base
stations,
because
NB
IOT
will
run
in
channels
the
same
size
as
GSM
or
GPRS
channels
that
they've
just
retired.
I
The
problem
with
MB
IOT
is
that
only
mobile
network
operators
can
run
it
now.
Waitlist
does
have
a
narrowband
option
that
technically
you
could
run
as
a
network.
If
you
could
find
somebody
to
make
and
sell
you
hardware
and
I,
keep
looking
for
hardware
and
I
haven't
found
it
yet.
So
that's
kind
of
a
not
yet
type
thing.
We've
got
another
cellular
thing,
that's
also
referred
to
as
5g
yeah
5g
is
everything
everything
everything
is
5g:
LTE,
machine-type
communications,
Kat,
m1
or
Kat
1m.
I
However,
you
want
to
say
it
uses
existing
LTE
base
stations
and
there's
six
230
kilohertz
channels,
so
this
is
narrowband,
but
not
like
super
narrow
band.
So
you
get
six
channels
per
one
point.
Four
megahertz
carrier
which
allows
cellular
operators
to
say
take
their
20
megahertz
of
LTE
spectrum
and
maybe
portion
off
1.4
Meg
on
each
side
and
run
some
LTE
services
on
the
side
of
their
big
fat.
Broadband
lte-a
errors,
the
endpoints
like
the
terminal
units.
They
decide
how
often
they
want
to
talk,
of
course,
its
cellular.
I
So
the
mobility
scales
to
international
networks
is
like
sim
card
based
stuff
and
since
it's
that
way,
only
a
mobile
network
operator
can
run
cat
and
one
two
minutes
I
can
do
this
I'm
almost
in
the
last
slide.
I
am
on
the
second
to
last
slide.
Laura
Webb,
low
power,
wide
area
network,
nothing
to
do
with
Laura
one
was
invented
here
at
IETF
or
at
I,
Triple
E,
or
anything
like
that.
But
Laura
Wynn
was
designed
for
battery-powered
Y
wireless
devices
supports
bi-directional
communications:
mobility
localization,
it
is
a
star
topology,
it
does
not.
I
Mesh
mesh
is
another
big
supporter
of
mesh
because
when
you
mesh,
you've
got
to
have
nodes
that
are
on
and
listening
all
the
time
and
listening
is
quite
a
hard
thing
for
IOT
devices
to
do
on
battery
power,
because
you've
got
to
run
your
CPU.
You've
got
to
demodulate
signals,
you've
got
to
say:
hey
is
this,
for
me:
do
I
need
to
do
something
with
it,
whereas
star
topology,
your
device
on
the
battery
says,
hey
I
want
to
talk,
I'm
gonna
talk
and
I'm
gonna.
I
I
There
are
multiple
levels
of
encryption:
it's
really
cool
I'm,
actually,
the
operator
of
a
Laurel,
mind
network
in
New,
Zealand
and
Cook
Islands,
and
now
some
base
stations
in
Indonesia
as
the
network
operator
I,
can
never
see
application
payloads,
because
the
application
data
has
a
second
encryption
key.
So
I
can
see
the
metadata
about
the
packets
going
over
the
networks
that
I
operate.
I
never
have
any
idea.
I
What's
inside
the
packets
Laurel
and
can
scale
to
international
networks,
anyone
can
run
a
low
online
network
and
that's
where
we
get
to
the
community
part,
because
we
have
this
wonderful
thing.
Oh
No
I've
got
two
more
slides.
Sorry,
okay,
if
you
have
a
community
network
and
you
want
ìit,
you
can
use
6lowpan,
but
it's
a
personal
area.
Network.
Lower
line
is
probably
the
best
for
large
areas,
and
we
have.
This
group
called
the
things
network
based
out
of
the
netherlands.
I
I
think
thank
you
who
have
done
this
amazing
thing,
because
they
have
provided
a
Laurel
and
controller
the
way.
Laura
went,
works,
you've
got
ends,
devices,
you've
got
base
stations
and
the
base
stations
talk
to
a
controller,
and
the
controller
is
like
a
mobile
network
core
it
kind
of
orchestrates.
The
movements
of
of
packets
to
and
from
TTN
is
a
free
cloud
controller
for
community
IOT
networks.
I
At
the
moment
there
are
3317,
as
of
whenever
I
took
this
screenshot
yesterday
or
the
day
before,
gateways
online,
and
if
you
make
an
application
on
TTN
like
I
make
it
here,
anyone
can
join
that
application
on
any
TTN
enabled
network
and
it
will
just
work.
So
if
you
want
to
do
Community
Network,
my
recommendation
is
Laurel
run
in
CTN,
but
you
could
do
Wi-Fi.
You
could
do
whatever
sorry
for
going
over
time.
Jane
I
get
excited
about
these.
We.
B
X
Is
informational,
I
posted
on
kya
mail
list,
but
there's
a
cool
measurement
of
IOT
homes
in
UK.
There's
a
paper
on
archive.
You
can
see
it
I
think
I
said,
which
is
pretty
alarming
in
terms
of
the
amount
of
data
most
practical
systems
people
are
buying
in
developed
regions
generate,
which
is
very
scary.
X
So
I
think
you
found
12
in
London
last
year
and
there's
an
issue
with
coexistence
for
multiple
radios.
So
this
came
up
and
one
of
the
folks
visiting
I
think
thing
and
there
was
a
site
meeting
about
what
do
we
do
about
all
the
different
types
of
radio
variety
that
a
low
bandwidth
for
living
in
the
is
M
band
and
the
band
is
getting
card
it
by
different
protocols
that
don't
know
how
to
coexist
nicely
and
it's
not
just
being
underlay
and
overlay,
because
there's
n
of
them
not
two
of
them.
X
I
V
I
B
R
I
So
Laura
LAN
is
an
open
network
stack.
However,
the
lower
radio
protocol
is
not
opened
because
there's
only
one
manufacturer
of
the
chip,
which
is
SEM,
Tech,
Kat,
m1,
I,
guess
it's
open
and
that
it's
3gpp,
but
there's
a
lot
of
intellectual
property
encumbrance
and
you
do
have
to
get
license
fees
for
that
again.
Nv
IOT
wait
list,
probably
technically
no,
maybe
is
mostly
open,
but
I
think
there's
IP
and
licensing
to
do
with
that.
Sig
Fox,
of
course,
is
completely
proprietary
lope.
I
These
things
are
pretty
much
open,
but
they're
rubbish,
eita,
215
protocols,
I
mean
yes,
they're,
open
you're,
going
to
be
paying
licensing
fees
bundled
into
the
chips,
because
some
people
have
IP
around
them
deep
down
inside.
There
are
some
things
that
are
not
open
but
they're,
pretty
open,
pretty
okay,
okay
and
John's
here
for
the
rest
of.
E
B
I
But
my
own
infrastructure
of
the
base
stations
or
IP
backhaul,
but
they
don't
have
a
default
route.
They
talk
on
a
private
network.
They
only
know
about
a
proxy
server
that
gets
their
traffic
to
the
Gateway,
to
the
the
network
controller,
so
I'm,
pretty
happy
with
the
security
and,
of
course,
all
of
the
over-the-air
stuff
is
incredibly
secure.
Other
protocols
yeah
not
so
much
in
some
cases
in
gracias
from
Mexico
answer
the
question.
Thank.