Intellect-Partners

Categories
Computer Science Electronics

Unlocking the 6G Future: Harnessing the Potential of Reconfigurable Intelligent Surfaces (RIS)

INTRODUCTION

With each successive generation of communication technology, telecommunication’s primary focus undergoes a transformation. The 2G and 3G epochs were primarily centered on human-to-human communication through voice and text. The advent of 4G marked a pivotal shift toward the extensive consumption of data, while the 5G era prioritized connecting the Internet of Things (IoT) and industrial automation systems.

In the forthcoming 6G era, intelligent computation will drive efficiency and improved human experience. While there is still ongoing innovation in 5G, with the introduction of 5G-Advanced standards, companies have already embarked on research for 6G, with plans to make it commercially available by 2030.

CHARACTERISTICS FOR 6G TECHNOLOGY

According to Nokia Bell Labs, six technology areas are expected to characterize 6G networks. These areas move the industry from faster connectivity alone toward intelligent, secure, sensor-rich and highly automated communication systems.

Figure 1: Six key technology areas expected to characterize 6G networks.
Figure 1: Six key technology areas expected to characterize 6G networks.

Artificial intelligence and machine learning – AI/ML techniques, especially deep learning, have rapidly advanced over the last decade and have already been deployed across domains involving image classification and computer vision, ranging from social networks to security. 5G will unleash the true potential of these technologies; with 5G-Advanced, AI/ML will be introduced into many parts of the network, across multiple layers and functions. From beam-forming optimization in the radio layer to scheduling at the cell site with self-optimizing networks, AI/ML can help achieve better performance at lower complexity.

Spectrum bands – Spectrum is a crucial element in providing radio connectivity. Every new mobile generation requires new pioneer spectrum to fully exploit the benefits of a new technology. Refarming existing mobile communication spectrum from legacy technology to the new generation will also become essential. New pioneer spectrum blocks for 6G are expected to include mid-bands of 7-20 GHz for urban outdoor cells enabling higher capacity through extreme MIMO, low bands of 460-694 MHz for extreme coverage, and sub-THz bands for peak data rates exceeding 100 Gbps.

A network that can sense – One of the most notable aspects of 6G would be its ability to sense the environment, people and objects. The network becomes a source of situational information, gathering signals that bounce off objects and determining type, shape, relative location, velocity and perhaps even material properties. This sensing mode can help create a mirror or digital twin of the physical world in combination with other sensing modalities, extending our senses to every point the network touches. Combining this information with AI/ML will provide new insights from the physical world and make the network more cognitive.

Extreme connectivity – The Ultra-Reliable Low-Latency Communication (URLLC) service that began with 5G will be refined and improved in 6G to address extreme connectivity requirements, including sub-millisecond latency. Network reliability could be amplified through simultaneous transmission, multiple wireless hops, device-to-device connections and AI/ML. Enhanced mobility combined with lower latency and improved reliability will support real-time video communications, holographic experiences and digital twin models updated in real time through the deployment of video sensors.

New network architectures – 5G is the first system designed to operate in enterprise and industrial environments, replacing wired connectivity. As demand and strain on the network increase, industries will require more advanced architectures that support greater flexibility and specialization. 5G is introducing service-based architecture in the core and cloud-native deployments that will be extended to parts of the RAN, with networks deployed in heterogeneous cloud environments involving private, public and hybrid clouds. As the core becomes more distributed and higher layers of the RAN become more centralized, there will be opportunities to reduce cost by converging functions. New network and service orchestration solutions exploiting AI/ML advances will result in an unprecedented level of network automation and lower operating costs.

Security and trust – Networks of all types are increasingly becoming targets of cyber-attacks. The dynamic nature of these threats makes sturdy security mechanisms imperative. 6G networks will be designed to protect against threats such as jamming. Privacy issues will also need to be considered when new mixed-reality worlds combine digital representations of real and virtual objects.

RECONFIGURABLE INTELLIGENT SURFACES (RIS)

A Reconfigurable Intelligent Surface (RIS) is a flat panel with small passive elements, approximately in the range of 1 cm2, each capable of independently adjusting the phase and potentially the amplitude of incident electromagnetic waves. Through precise control of these elements, reradiated waves can be directed toward specific directions with the help of an RIS controller. This enables alternative links within a cell and facilitates communication in non-line-of-sight scenarios, supporting extreme connectivity, AI/ML-based signal augmentation, innovative network architecture and optimized bandwidth utilization.

RIS can be fashioned as self-configuring elements within wireless network infrastructure, fine-tuning electromagnetic attributes in response to shifting traffic demands and propagation characteristics. RIS is conceptually appealing and offers practical implementation advantages because it does not require energy-hungry radio-frequency (RF) chains. The absence of RF chains makes RIS an energy-efficient and cost-effective solution compared with massive MIMO technology, which requires an RF chain for each antenna element and therefore increases hardware cost, complexity and power consumption.

Because RIS is highly passive and requires minimal power for operation, it can be an eco-friendly and cost-effective solution deployable on surfaces such as walls, ceilings, billboards and other infrastructure. However, RIS design still requires careful consideration of coverage range, surface size and the number of elements needed.

Figure 2: Representative RIS-assisted network scenarios, including blocked users, UAV communication, mobile edge computing, vehicular networks, NOMA and physical-layer security.
Figure 2: Representative RIS-assisted network scenarios, including blocked users, UAV communication, mobile edge computing, vehicular networks, NOMA and physical-layer security.

Source: IET Communications RIS article, as shown in the source image.

PATENT ACTIVITY AND COMPETITIVE LANDSCAPE

RIS technology is gaining traction among researchers in 5G-Advanced and 6G. After the standardization of 5G in 2019, patenting activity in RIS technology accelerated because RIS promises gains in spectral and energy efficiency without the expense of massive cell densification, while also unlocking numerous future telecommunication use cases.

Figure 3: RIS patent application activity by application year.
Figure 3: RIS patent application activity by application year.

Source note: Patent analysis using Orbit Intelligence; values reconstructed from the provided screenshot.

The patent landscape view indicates that the top owners of IP related to RIS technology include Qualcomm, Huawei and Samsung. Several Chinese universities are also actively researching in this area, and China constitutes a substantial share of the global RIS patent landscape.

Figure 4: Leading RIS IP owners visible in the source landscape view by patent office or publication route.
Figure 4: Leading RIS IP owners visible in the source landscape view by patent office or publication route.

Source note: Patent analysis using Orbit Intelligence; data reconstructed from the provided screenshot.

CONCLUSION

6G is expected to extend mobile networks beyond connectivity by embedding intelligence, sensing, automation, security and extreme performance into the network fabric. RIS is highly aligned with this direction: by shaping the wireless propagation environment itself, RIS can create alternative links, improve non-line-of-sight coverage, reduce energy consumption and support new architectures for dense, intelligent and adaptive wireless systems.

As patenting activity and research investment increase, RIS is likely to remain a key enabling technology in the transition from 5G-Advanced toward commercial 6G systems.

REFERENCES

Categories
Computer Science Electronics

A Hands-on Guide to Wireshark Analysis (Decoding the Digital Stream)

INTRODUCTION

In today’s digital era, the number of network users is rising rapidly, leading to increased demand for network traffic. As traffic grows, monitoring becomes a top priority to ensure smooth and efficient user services. This is especially important and complex in large networks, where traffic monitoring is critical but challenging. Higher traffic also increases the risk of network attacks, which can affect both performance and security.

A successful attack can disrupt the entire network, causing financial and operational losses for organizations and service providers. Breaches also threaten user privacy and can result in data misuse, creating serious risks and potential leaks of confidential information. Packet sniffing is an important tool for network monitoring, enabling administrators to observe network activities and identify weaknesses. This blog analyzes network traffic using the Wireshark tool, a widely used packet sniffer that captures, reports, and analyzes network traffic to help identify and address issues.

WHAT IS PACKET SNIFFING?

Network sniffing, also known as packet sniffing, is a process of scanning the data packets transmitted over a computer network. The packet sniffing process can be done by a special software tool or hardware known as a packet sniffer, also referred to as a network analyzer or a packet analyzer. The packet sniffing is used for various purposes, the data packets comprising different types of traffic sent over a network, such as to capture user authentication traffic, capture chat messages traffic, capture VOIP call traffic, and capture files during transmission over the network.

It is a process to analyze packets transmitted through the TCP/IP protocol that connects devices to a wireless or wired network. The network admin uses packet sniffing for monitoring the network and analyzing the security of the network. It is used to analyze harmful data packet transmission within the network. The packet sniffing works by observing data transmitted or received between the networked computers and devices and the internet.

HOW PACKET SNIFFING IS PERFORMED?

Packet sniffing requires specialized tools that capture network traffic for analysis. These tools, such as Wireshark, allow users to filter and monitor only the required traffic, making analysis easier. Wireshark is an open source, cross-platform, graphical network packet analyzer widely used for troubleshooting network issues, monitoring request and response transmissions, and analyzing network security.

In this blog, experiments focus on capturing website and chat traffic using Wireshark and analyzing the data in detail. Note that the blog does not cover the basic features of Wireshark. The tool captures both request data sent from user devices to servers and response data sent back to user devices.

Figure 1 shows the Wireshark tool that displays multiple interfaces; the user selects the respective interface to capture the packets using a specific interface. Generally, a Wi-Fi interface is used to capture the traffic in a wireless network.

Figure 1: Wireshark Tool interface
Figure 1: Wireshark Tool interface
EXPERIMENTAL SETUP

In this, the two experiments were performed using the Wireshark tool as given below in detail:

The First Experiment is to capture a website page’s traffic when a user logs in to their account. The Wireshark capture tool is running on the computer system; the user is accessing the website on their mobile device. Where the computer system and mobile device are connected within the same LAN network.

The architecture of the experiment setup is given below in Figure 2. In this, the main goal is to analyze and monitor the website when a user logs in to the website. This allows for monitoring the security of a website to identify whether there is password encryption is enabled or not when the user logs in to the website. Further, it is also used to identify whether users’ logins to the website are authentic or not.

Figure 2: First Experimental Setup
Figure 2: First Experimental Setup

The Second Experiment captures the communication traffic between two users. The Wireshark capture tool is running on the computer system; user 1 has mobile device 1, and user 2 has mobile device 2. Both users’ mobile devices are installed with the same communication application, such as chat communication. The mobile device 1, mobile device 2, and computer system are connected within the same LAN network.

The computer system installed with the Wireshark tool captures the traffic of both mobile devices when users communicate with each other. The detailed architecture of the experiment setup is given below in Figure 3. In this, the main goal is to analyze and monitor how the communication is performed between the users, and identify whether there is message encryption between the users.

Figure 3: Second Experimental Setup
Figure 3: Second Experimental Setup
PERFORMING FIRST EXPERIMENT

In the first experiment, the random website login traffic was captured using Wireshark and the captured packets. The user visits the website, login and enters their login ID and password. If the entered login ID and password are incorrect, the website server does not authenticate the user. If the login ID and password are correct, the website server authenticates the user and allows the user to log in to the website, as shown in Figure 4.

Figure 4: User performing a login action
Figure 4: User performing a login action

When the user logs in to the website, the Wireshark tool running in a network captures all the traffic between the source to destination and vice versa. The captured packets are used for monitoring and analyzing for further purposes. Figure 5 shows the Wireshark tool capturing the user login traffic.

Figure 5: Wireshark tool captured the website login traffic
Figure 5: Wireshark tool captured the website login traffic

Figure 5 shows the Wireshark tools capturing the website traffic when the user logs in to the website. Here, the selected packet number 200 was analyzed, and the Wireshark tool captures the source IPv6 address from which the request is transmitted, such as a mobile device. The destination IPv6 address is the address of the destination server, such as a website server, where the request (such as a POST request method) is received from the source mobile device to log in to the website.

HTTP3 is the protocol used to exchange information on the World Wide Web (WWW). The information includes the data transmitted between the mobile device and the server. The information further includes response and request header information, such as request method, User-Agent, Cookies, server information, origin, referrer, etc.

PERFORMING SECOND EXPERIMENT

In the second experiment, the communication between two users, such as chat message traffic, was captured using Wireshark, and the captured packets were analyzed. In this experiment, both users use a chatting application (such as LAN Messenger) installed on their mobile devices. The chat application runs in the local area network where multiple users communicate through messages within the LAN network. The Wireshark tool is installed in a computer system connected to the same LAN network where the two user devices are connected. Figure 6a shows that the user device 1 communicates with the user device 2, and Figure 6b shows that the user device 2 communicates with the user device 1.

Figure 6a (left side) shows that the user device 1 communicates with the user device 2, and Figure 6b (right side) shows that the user device 2 communicates with the user device 1
Figure 6a (left side) shows that the user device 1 communicates with the user device 2, and Figure 6b (right side) shows that the user device 2 communicates with the user device 1

During communication, the traffic is captured for the user device 1 and user device 2 using the Wireshark traffic capture tool installed in a computer connected to the same network. Figure 7 shows the Wireshark tool capturing the traffic for two devices while chatting.

Figure 7: Traffic capture of User Device 1 and User Device 2
Figure 7: Traffic capture of User Device 1 and User Device 2

According to Figure 7, the Wireshark tool captures the messaging data for both the user devices. However, due to end-to-end encryption, the real message is encrypted in Wireshark. The figure shows that the source IP Address 192.168.137.45 is the address of user device 1 that sends the message to user device 2, which is transmitted via destination 216.239.36.223 using TCP protocol.

The source IP Address 192.168.132.22 is the address of user device 2 that sends the message to user device 1, that transmitted via destination 216.239.34.223 using TCP protocol. Deeply analyzing, the Wireshark tool also captures the device-related information, such as XiaomiCommun_45:fa:3e, communication interface such as Ethernet II. It also contains other information, such as detailed frame information, etc.

CONCLUSION

This blog mainly focuses on the experiments that were performed using the Wireshark packet capture tool. It also explains the basics of the Wireshark tool and the analysis of captured packets. It will also be useful in multiple sectors, such as security purposes, patent infringement tasks, reverse engineering tasks, etc. In the future, more experiments can be performed in different scenarios, such as in VoIP calling, using different Wireshark interface, and deep analysis of network packets.

REFERENCES

[1] https://www.academia.edu/109770037/Analysis_of_Network_Traffic_by_Using_Packet_Sniffing_Tool_Wireshark

[2] https://www.spiceworks.com/it-security/network-security/articles/what-is-packet-sniffing/

[3] https://www.varonis.com/blog/how-to-use-wireshark

[4] https://fengweiz.github.io/19fa-cs315/labs/lab1-instruction.pdf

[5] https://www.geeksforgeeks.org/computer-networks/what-is-packet-sniffing/

[6] https://link.springer.com/chapter/10.1007/978-3-031-43140-1_18

[7] https://www.igi-global.com/chapter/the-role-of-wireshark-in-packet-inspection-and-password-sniffing-for-network-security/363029

[8] https://ieeexplore.ieee.org/abstract/document/8319360

Categories
Computer Science Electronics

Patent Showdown Nokia Sues Warner Bros Over Video Streaming Tech

In the latest move of the global streaming wars, Finnish technology leader Nokia (NOKIA TECHNOLOGIES OY) has significantly expanded its U.S. patent enforcement campaign, filing a new lawsuit against Warner Bros. Discovery (WARNER BROS. ENTERTAINMENT INC., WARNER BROS. DISCOVERY, INC., AND HOME BOX OFFICE, INC.) in the Delaware federal court.

This legal action signals Nokia’s uncompromising stance on monetizing its crucial intellectual property related to video compression—the foundational technology that powers high-definition streaming on platforms like Max (formerly HBO Max) and Discovery+.


The Core of the Conflict

The lawsuit, made public this week, directly accuses Warner Bros.’ streaming services of violating Nokia’s patent rights in technology critical for encoding and decoding video.

Nokia’s patented innovations enable the highly efficient compression of raw video files, a process essential for delivering a high-definition experience without crippling bandwidth requirements. In its complaint, Nokia alleges infringement on 13 of its patents, which cover fundamental elements of modern video coding standards.

Nokia’s statement emphasizes its preference for negotiation: “Litigation is never our first choice… we hope Warner will engage with us to reach an agreement to pay for the use of our technologies in their streaming services.”

The complaint confirms that Nokia attempted to negotiate a license with Warner Bros. since 2023, but the companies failed to reach an agreement on fair licensing terms, leaving Nokia to seek an unspecified amount of monetary damages through the court.

A Pattern of Enforcement

The legal action against Warner Bros. Discovery is far from an isolated event; it is part of Nokia’s focused global strategy to secure compensation for its extensive patent portfolio:

  • Settled with Amazon Following a multi-jurisdictional legal battle, Nokia successfully resolved its patent disputes with Amazon earlier this year. The settlement covered the use of Nokia’s video technologies in Amazon’s streaming services and devices, validating the strength of Nokia’s claims.
  • Ongoing Cases Nokia maintains similar patent infringement cases against other major media companies like Paramount, as well as hardware manufacturers such as Acer and Hisense.
  • Global Reach Nokia’s aggressive enforcement includes filing parallel lawsuits against Warner Bros. in major jurisdictions like the Unified Patent Court (UPC), Germany, and Brazil, increasing the legal and commercial pressure on the media giant.

This campaign highlights Nokia’s shift from a device manufacturer to a technology licensor, ensuring its massive investment in research and development—particularly in Standard Essential Patents (SEPs) for video codecs like H.264 and H.265 (HEVC)—is properly rewarded.

Case Details at a Glance

This case will be a key indicator of how courts value the underlying technology that fuels the entire streaming industry, particularly given Nokia’s recent successful resolution with Amazon.

Legal DetailInformation
Case NameNokia Technologies Oy v. Warner Bros Entertainment Inc
VenueU.S. District Court for the District of Delaware
Case NumberNo. 1:25-cv-01337
Nokia CounselMcKool Smith (Warren Lipschitz, Erik Fountain, etc.)
Warner CounselAttorney information not yet available

As streaming platforms continue to compete fiercely for content, this lawsuit serves as a powerful reminder that foundational technological innovation—the very code that keeps the video playing smoothly—remains a highly valuable and contested asset.