Pub Date : 2022-10-05DOI: 10.1109/NoF55974.2022.9942528
H. Ravuri, Jakob Struye, M. T. Vega, Jeroen van der Hooft, J. Famaey, T. Wauters, F. Turck
Millimeter wave (mmWave) communication technology is expected to enable ultra-high speed and ultra-low latency communications owing to the availability of high-capacity bands at a frequency range of 30 GHz to 300 GHz. Despite its abundant resources, it is prone to signal attenuation due to blockage and mobility. So far, evaluations of first generation mmWave hardware are limited to lower-layer metrics. In this demonstrator, we propose to evaluate the multimedia application performance while using commercial off-the-shelf routers, using an 8K video streaming scenario. To achieve this, this paper introduces a mmWave testbed which incorporates mobility and blockage while streaming the video. In addition, it provides a detailed description of the steps involved in the deployment of experiments and analysis of the results.
{"title":"Streaming 8K Video over Millimeter Wave Networks: An Experimental Demonstrator","authors":"H. Ravuri, Jakob Struye, M. T. Vega, Jeroen van der Hooft, J. Famaey, T. Wauters, F. Turck","doi":"10.1109/NoF55974.2022.9942528","DOIUrl":"https://doi.org/10.1109/NoF55974.2022.9942528","url":null,"abstract":"Millimeter wave (mmWave) communication technology is expected to enable ultra-high speed and ultra-low latency communications owing to the availability of high-capacity bands at a frequency range of 30 GHz to 300 GHz. Despite its abundant resources, it is prone to signal attenuation due to blockage and mobility. So far, evaluations of first generation mmWave hardware are limited to lower-layer metrics. In this demonstrator, we propose to evaluate the multimedia application performance while using commercial off-the-shelf routers, using an 8K video streaming scenario. To achieve this, this paper introduces a mmWave testbed which incorporates mobility and blockage while streaming the video. In addition, it provides a detailed description of the steps involved in the deployment of experiments and analysis of the results.","PeriodicalId":223811,"journal":{"name":"2022 13th International Conference on Network of the Future (NoF)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128092142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-05DOI: 10.1109/NoF55974.2022.9942586
Pablo Avila-Campos, J. Haxhibeqiri, Xianjun Jiao, Muhammad Aslam, Gilson Miranda, I. Moerman, J. Hoebeke
Time Sensitive Networking (TSN) is being utilized for industrial deterministic applications. Machine control is an example of such applications, which requires high reliability, low and deterministic latency. Currently, such requirements can only be met by wired networks that do not offer the wireless flexibility. For supporting TSN in end-to-end wired-wireless networks, TSN features need to be presented in the wireless network domain as well. In this demo we show the ability of wireless TSN (W-TSN) to support periodic machine control traffic with low latency under other background traffic in the network. We demonstrate time synchronization and scheduling mechanisms in a wireless setting by employing a control loop (a system to balance a ball in a canal) scenario where the time-critical traffic maintains the required latency under scheduled case. This will be demonstrated in a setup composed of imec's W-TSN evaluation kit built on top of the openwifi SDR platform.
{"title":"Periodic Control Traffic Support in a Wireless Time-Sensitive Network","authors":"Pablo Avila-Campos, J. Haxhibeqiri, Xianjun Jiao, Muhammad Aslam, Gilson Miranda, I. Moerman, J. Hoebeke","doi":"10.1109/NoF55974.2022.9942586","DOIUrl":"https://doi.org/10.1109/NoF55974.2022.9942586","url":null,"abstract":"Time Sensitive Networking (TSN) is being utilized for industrial deterministic applications. Machine control is an example of such applications, which requires high reliability, low and deterministic latency. Currently, such requirements can only be met by wired networks that do not offer the wireless flexibility. For supporting TSN in end-to-end wired-wireless networks, TSN features need to be presented in the wireless network domain as well. In this demo we show the ability of wireless TSN (W-TSN) to support periodic machine control traffic with low latency under other background traffic in the network. We demonstrate time synchronization and scheduling mechanisms in a wireless setting by employing a control loop (a system to balance a ball in a canal) scenario where the time-critical traffic maintains the required latency under scheduled case. This will be demonstrated in a setup composed of imec's W-TSN evaluation kit built on top of the openwifi SDR platform.","PeriodicalId":223811,"journal":{"name":"2022 13th International Conference on Network of the Future (NoF)","volume":"82 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126121388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-05DOI: 10.1109/NoF55974.2022.9942552
A. Mahjoubi, Karl-Johan Grinnemo, J. Taheri
Due to cloud computing's limitations, edge computing has emerged to address computation-intensive and time-sensitive applications. In edge computing, users can offload their tasks to edge servers. However, the edge servers' resources are limited, making task scheduling everything but easy. In this paper, we formulate the scheduling of tasks between the user equipment, the edge, and the cloud as a Mixed-Integer Linear Programming (MILP) problem that aims to minimize the total system delay. To solve this MILP problem, we propose an Enhanced Healed Genetic Algorithm solution (EHGA). The results with EHGA are compared with those of CPLEX and a few heuristics previously proposed by us. The results indicate that EHGA is more accurate and reliable than the heuristics and Quicker than CPLEX at solving the MILP problem.
{"title":"EHGA: A Genetic Algorithm Based Approach for Scheduling Tasks on Distributed Edge-Cloud Infrastructures","authors":"A. Mahjoubi, Karl-Johan Grinnemo, J. Taheri","doi":"10.1109/NoF55974.2022.9942552","DOIUrl":"https://doi.org/10.1109/NoF55974.2022.9942552","url":null,"abstract":"Due to cloud computing's limitations, edge computing has emerged to address computation-intensive and time-sensitive applications. In edge computing, users can offload their tasks to edge servers. However, the edge servers' resources are limited, making task scheduling everything but easy. In this paper, we formulate the scheduling of tasks between the user equipment, the edge, and the cloud as a Mixed-Integer Linear Programming (MILP) problem that aims to minimize the total system delay. To solve this MILP problem, we propose an Enhanced Healed Genetic Algorithm solution (EHGA). The results with EHGA are compared with those of CPLEX and a few heuristics previously proposed by us. The results indicate that EHGA is more accurate and reliable than the heuristics and Quicker than CPLEX at solving the MILP problem.","PeriodicalId":223811,"journal":{"name":"2022 13th International Conference on Network of the Future (NoF)","volume":"304 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115932945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-05DOI: 10.1109/NoF55974.2022.9942547
Zorigtbaatar Chuluundorj, Shuwen Liu, Craig A. Shue
The security of Internet-of-Things (IoT) devices in the residential environment is important due to their widespread presence in homes and their sensing and actuation capabilities. However, securing IoT devices is challenging due to their varied designs, deployment longevity, multiple manufacturers, and potentially limited availability of long-term firmware updates. Attackers have exploited this complexity by specifically targeting IoT devices, with some recent high-profile cases affecting millions of devices. In this work, we explore access control mechanisms that tightly constrain access to devices at the residential router, with the goal of precluding access that is inconsistent with legitimate users' goals. Since many residential IoT devices are controlled via applications on smartphones, we combine application sensors on phones with sensors at residential routers to analyze workflows. We construct stateful filters at residential routers that can require user actions within a registered smartphone to enable network access to an IoT device. In doing so, we constrain network packets only to those that are consistent with the user's actions. In our experiments, we successfully identified 100% of malicious traffic while correctly allowing more than 98% of legitimate network traffic. The approach works across device types and manufacturers with straightforward API and state machine construction for each new device workflow.
{"title":"Generating Stateful Policies for IoT Device Security with Cross-Device Sensors","authors":"Zorigtbaatar Chuluundorj, Shuwen Liu, Craig A. Shue","doi":"10.1109/NoF55974.2022.9942547","DOIUrl":"https://doi.org/10.1109/NoF55974.2022.9942547","url":null,"abstract":"The security of Internet-of-Things (IoT) devices in the residential environment is important due to their widespread presence in homes and their sensing and actuation capabilities. However, securing IoT devices is challenging due to their varied designs, deployment longevity, multiple manufacturers, and potentially limited availability of long-term firmware updates. Attackers have exploited this complexity by specifically targeting IoT devices, with some recent high-profile cases affecting millions of devices. In this work, we explore access control mechanisms that tightly constrain access to devices at the residential router, with the goal of precluding access that is inconsistent with legitimate users' goals. Since many residential IoT devices are controlled via applications on smartphones, we combine application sensors on phones with sensors at residential routers to analyze workflows. We construct stateful filters at residential routers that can require user actions within a registered smartphone to enable network access to an IoT device. In doing so, we constrain network packets only to those that are consistent with the user's actions. In our experiments, we successfully identified 100% of malicious traffic while correctly allowing more than 98% of legitimate network traffic. The approach works across device types and manufacturers with straightforward API and state machine construction for each new device workflow.","PeriodicalId":223811,"journal":{"name":"2022 13th International Conference on Network of the Future (NoF)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115679670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-05DOI: 10.1109/NoF55974.2022.9942649
Johannes Zerwas, Patrick Krämer, Razvan-Mihai Ursu, Navidreza Asadi, Phil Rodgers, Leon Wong, W. Kellerer
This demo presents a self-operating Kubernetes (K8s) cluster that uses digital twinning and machine learning to autonomously adapt its Horizontal Pod Autoscaler (HPA) to workload changes. The demo uses a digital twin of a K8s cluster to gather performance statistics and learn a model for the workload. With the model, the cluster autonomously adjusts HPA parameters for better performance. The demo illustrates this process and shows that the requested pod seconds decrease by ~37 %, while the request latency stays mostly unaffected.
{"title":"KAPETÁNIOS: Automated Kubernetes Adaptation through a Digital Twin","authors":"Johannes Zerwas, Patrick Krämer, Razvan-Mihai Ursu, Navidreza Asadi, Phil Rodgers, Leon Wong, W. Kellerer","doi":"10.1109/NoF55974.2022.9942649","DOIUrl":"https://doi.org/10.1109/NoF55974.2022.9942649","url":null,"abstract":"This demo presents a self-operating Kubernetes (K8s) cluster that uses digital twinning and machine learning to autonomously adapt its Horizontal Pod Autoscaler (HPA) to workload changes. The demo uses a digital twin of a K8s cluster to gather performance statistics and learn a model for the workload. With the model, the cluster autonomously adjusts HPA parameters for better performance. The demo illustrates this process and shows that the requested pod seconds decrease by ~37 %, while the request latency stays mostly unaffected.","PeriodicalId":223811,"journal":{"name":"2022 13th International Conference on Network of the Future (NoF)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125376917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-05DOI: 10.1109/NoF55974.2022.9942546
Daniela Sousa, S. Sargento, Miguel Luís
On temporary events, like concerts or emergency scenarios, where a communication infrastructure may not be sufficient or even present, networks can be built in a spontaneous way with the available network elements and radio access technologies, to support proper communication and data access. However, these ad-hoc networks, without a centralized view, can be inefficient when compared to a detached centralized control approach like in Software Defined Networks (SDNs). Moreover, SDNs can bring several advantages to these environments, such as adaptability and performance increase, despite not supporting wireless interfaces. However, in these scenarios, not all nodes are able to support SDN. This paper proposes a Spontaneous Heterogeneous Wireless Software Defined Network with a hybrid approach that is able to opportunistically use all available elements that may compose the network, regardless of whether they are legacy or SDN nodes. The proposed approach is tested in several scenarios with a different ratio of legacy to SDN nodes. We conclude that the network is able to work with hybrid nodes, and that when more Hybrid SDN (H-SDN) devices are used to forward packets, the network performance increases or is maintained when compared to a pure ad-hoc solution.
{"title":"Hybrid Wireless Network with SDN and Legacy Devices in ad-hoc Environments","authors":"Daniela Sousa, S. Sargento, Miguel Luís","doi":"10.1109/NoF55974.2022.9942546","DOIUrl":"https://doi.org/10.1109/NoF55974.2022.9942546","url":null,"abstract":"On temporary events, like concerts or emergency scenarios, where a communication infrastructure may not be sufficient or even present, networks can be built in a spontaneous way with the available network elements and radio access technologies, to support proper communication and data access. However, these ad-hoc networks, without a centralized view, can be inefficient when compared to a detached centralized control approach like in Software Defined Networks (SDNs). Moreover, SDNs can bring several advantages to these environments, such as adaptability and performance increase, despite not supporting wireless interfaces. However, in these scenarios, not all nodes are able to support SDN. This paper proposes a Spontaneous Heterogeneous Wireless Software Defined Network with a hybrid approach that is able to opportunistically use all available elements that may compose the network, regardless of whether they are legacy or SDN nodes. The proposed approach is tested in several scenarios with a different ratio of legacy to SDN nodes. We conclude that the network is able to work with hybrid nodes, and that when more Hybrid SDN (H-SDN) devices are used to forward packets, the network performance increases or is maintained when compared to a pure ad-hoc solution.","PeriodicalId":223811,"journal":{"name":"2022 13th International Conference on Network of the Future (NoF)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126020446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-05DOI: 10.1109/NoF55974.2022.9942669
Soumeya Kaada, Marie-Line Alberi-Morel, G. Rubino, Sofiene Jelassi
A 5G Radio Access Network (5G-RAN) can be disturbed or shutdown due to a variety of failures, in spite of advanced optimization techniques and self-healing methods. Recently, operators started to take an interest in improving the resilience of communication networks with adaptive compensation techniques to mitigate outage-induced performance degradation. However, for the sake of effective and efficient resilience management, it is vital to be able to measure current and prospective resiliency levels of a given 5G-RAN using relevant and explicit metrics. Thus, the characterisation of resilience goes over a thorough analysis of 5G-RAN performance indicators followed by a rigorous quantification of current and future levels of resilience. In this work, we perform an analysis and a quantification of 5G-RAN resilience using a coverage indicator. It is known as a main performance indicator for network planners and operators, coverage is a necessary prerequisite to ensure a certain level of Quality of Service. For that, we model the network coverage using Continuous Time Markov Chains (CTMCs) where coverage status is characterized with multiple states defined with Reference Signal Received Power (RSRP) signal. The proposed Markov model is analytically studied allowing to perform quantitative analysis, predict coverage outage and provide resilience quantification. Using our model, we conduct numerical analysis of several usage scenarios and propose a resilience framework to show the usability of our proposed approach.
{"title":"Resilience analysis and quantification method for 5G-Radio Access Networks","authors":"Soumeya Kaada, Marie-Line Alberi-Morel, G. Rubino, Sofiene Jelassi","doi":"10.1109/NoF55974.2022.9942669","DOIUrl":"https://doi.org/10.1109/NoF55974.2022.9942669","url":null,"abstract":"A 5G Radio Access Network (5G-RAN) can be disturbed or shutdown due to a variety of failures, in spite of advanced optimization techniques and self-healing methods. Recently, operators started to take an interest in improving the resilience of communication networks with adaptive compensation techniques to mitigate outage-induced performance degradation. However, for the sake of effective and efficient resilience management, it is vital to be able to measure current and prospective resiliency levels of a given 5G-RAN using relevant and explicit metrics. Thus, the characterisation of resilience goes over a thorough analysis of 5G-RAN performance indicators followed by a rigorous quantification of current and future levels of resilience. In this work, we perform an analysis and a quantification of 5G-RAN resilience using a coverage indicator. It is known as a main performance indicator for network planners and operators, coverage is a necessary prerequisite to ensure a certain level of Quality of Service. For that, we model the network coverage using Continuous Time Markov Chains (CTMCs) where coverage status is characterized with multiple states defined with Reference Signal Received Power (RSRP) signal. The proposed Markov model is analytically studied allowing to perform quantitative analysis, predict coverage outage and provide resilience quantification. Using our model, we conduct numerical analysis of several usage scenarios and propose a resilience framework to show the usability of our proposed approach.","PeriodicalId":223811,"journal":{"name":"2022 13th International Conference on Network of the Future (NoF)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128974174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-05DOI: 10.1109/NoF55974.2022.9942535
Jakob Struye, H. Ravuri, Hany Assasa, Claudio Fiandrino, Filip Lemic, Joerg Widmer, J. Famaey, M. T. Vega
Achieving extremely high-quality and truly immersive interactive Virtual Reality (VR) is expected to require a wireless link to the cloud, providing multi-gigabit throughput and extremely low latency. A prime candidate for fulfilling these requirements is millimeter-wave (mmWave) communications, operating in the 30 to 300 GHz bands, rather than the traditional sub-6 GHz. Evaluations with first-generation mmWave Wi-Fi hardware, based on the IEEE 802.11ad standard, have so far largely remained limited to lower-layer metrics. In this work, we present the first experimental analysis of the capabilities of mmWave for streaming VR content, using a novel testbed capable of repeatably creating blockage through mobility. Using this testbed, we show that (a) motion may briefly interrupt transmission, (b) a broken line of sight may degrade throughput unpredictably, and (c) TCP-based streaming frameworks need careful tuning to behave well over mmWave.
{"title":"Opportunities and Challenges for Virtual Reality Streaming over Millimeter-Wave: An Experimental Analysis","authors":"Jakob Struye, H. Ravuri, Hany Assasa, Claudio Fiandrino, Filip Lemic, Joerg Widmer, J. Famaey, M. T. Vega","doi":"10.1109/NoF55974.2022.9942535","DOIUrl":"https://doi.org/10.1109/NoF55974.2022.9942535","url":null,"abstract":"Achieving extremely high-quality and truly immersive interactive Virtual Reality (VR) is expected to require a wireless link to the cloud, providing multi-gigabit throughput and extremely low latency. A prime candidate for fulfilling these requirements is millimeter-wave (mmWave) communications, operating in the 30 to 300 GHz bands, rather than the traditional sub-6 GHz. Evaluations with first-generation mmWave Wi-Fi hardware, based on the IEEE 802.11ad standard, have so far largely remained limited to lower-layer metrics. In this work, we present the first experimental analysis of the capabilities of mmWave for streaming VR content, using a novel testbed capable of repeatably creating blockage through mobility. Using this testbed, we show that (a) motion may briefly interrupt transmission, (b) a broken line of sight may degrade throughput unpredictably, and (c) TCP-based streaming frameworks need careful tuning to behave well over mmWave.","PeriodicalId":223811,"journal":{"name":"2022 13th International Conference on Network of the Future (NoF)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131715991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-05DOI: 10.1109/NoF55974.2022.9942501
Sudhendu Kumar, Martin Beverley, Derek Engi, Sam Grimee, Nagendra Kumar Nainar, Marisol Palmero, G. Salgueiro, Y. Viniotis
Experience Telemetry is a branch of Telemetry that collects non-operational telemetry data from IT infrastructure in order to facilitate the work of roles such as architects, product managers, customer success and user experience planners, in any organization. These roles have interests geared more towards the business rather than operational utility of any product or service. Such data is consumed by various management applications to provide analytics and insights for the above mentioned users. The novelty in this paper lies in the demonstration and qualitative evaluation of how Experience Telemetry concepts can be applied in solving two specific lifecycle management and operations problems, thus advancing the current state-of-practice.
{"title":"Leveraging Experience Telemetry: Use Cases","authors":"Sudhendu Kumar, Martin Beverley, Derek Engi, Sam Grimee, Nagendra Kumar Nainar, Marisol Palmero, G. Salgueiro, Y. Viniotis","doi":"10.1109/NoF55974.2022.9942501","DOIUrl":"https://doi.org/10.1109/NoF55974.2022.9942501","url":null,"abstract":"Experience Telemetry is a branch of Telemetry that collects non-operational telemetry data from IT infrastructure in order to facilitate the work of roles such as architects, product managers, customer success and user experience planners, in any organization. These roles have interests geared more towards the business rather than operational utility of any product or service. Such data is consumed by various management applications to provide analytics and insights for the above mentioned users. The novelty in this paper lies in the demonstration and qualitative evaluation of how Experience Telemetry concepts can be applied in solving two specific lifecycle management and operations problems, thus advancing the current state-of-practice.","PeriodicalId":223811,"journal":{"name":"2022 13th International Conference on Network of the Future (NoF)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132855613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-05DOI: 10.1109/NoF55974.2022.9942567
Khabaz Sehla, Kaouthar Ouali Boulila, T. Nguyen, G. Pujolle, Moustapha Ould El Aoun, Pedro B. Velloso
5G Vehicle-to-Everything (5G-V2X) is a new emerging technology for vehicular networks standardized by 3GPP to contribute to road safety services. The flexibility of the New Radio (NR) frame structure is one of the most interesting 5G key features enabled by the use of the new 5G numerologies. The 5G numerologies are an enabler to meet the requirements of a wide range of 5G services. Indeed, V2X communication encompasses a variety of applications with different requirements. Therefore, the choice of the appropriate numerology for each V2X scenario is of particular importance. To this end, in this paper we present a comprehensive study of the impact of 5G numerologies on the performance of V2X applications. Using the Simu5G and 5GVLL simulators, we demonstrate that the choice of the appropriate numerology is a trade-off between the targeted requirements of V2X applications, the Inter-Carrier Interference (ICI) and the Inter-Symbol Interference (ISI) issues.
{"title":"A Comprehensive Study of the Impact of 5G Numerologies on V2X Communications","authors":"Khabaz Sehla, Kaouthar Ouali Boulila, T. Nguyen, G. Pujolle, Moustapha Ould El Aoun, Pedro B. Velloso","doi":"10.1109/NoF55974.2022.9942567","DOIUrl":"https://doi.org/10.1109/NoF55974.2022.9942567","url":null,"abstract":"5G Vehicle-to-Everything (5G-V2X) is a new emerging technology for vehicular networks standardized by 3GPP to contribute to road safety services. The flexibility of the New Radio (NR) frame structure is one of the most interesting 5G key features enabled by the use of the new 5G numerologies. The 5G numerologies are an enabler to meet the requirements of a wide range of 5G services. Indeed, V2X communication encompasses a variety of applications with different requirements. Therefore, the choice of the appropriate numerology for each V2X scenario is of particular importance. To this end, in this paper we present a comprehensive study of the impact of 5G numerologies on the performance of V2X applications. Using the Simu5G and 5GVLL simulators, we demonstrate that the choice of the appropriate numerology is a trade-off between the targeted requirements of V2X applications, the Inter-Carrier Interference (ICI) and the Inter-Symbol Interference (ISI) issues.","PeriodicalId":223811,"journal":{"name":"2022 13th International Conference on Network of the Future (NoF)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132225020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}