Isaac Kuma Yeboah, Richard Brace, Kwabena Agyapong-Kondua, Matthew Asiedu, Henrritta Kuma Yeboah
Wireless technology is presently one of the most actively researched fields of digital communication systems. Wireless communication technologies are insufficient without an understanding of antenna design and operation. A wide range of radio frequency equipment, including microwave antennas, microwave ovens, cordless telephones, and medical devices, utilize the 2.4 GHz band. In this article, a parabolic mesh dish was used to build and improve a bi-quad antenna with a central working frequency of 2.445 GHz. The bi-quad antenna was put in a parabolic mesh dish to optimize wave propagation. The findings show that the antenna obtained a signal strength range of 70% to 80%, increasing the directivity of WLAN coverage. The bi-quad antenna feed was placed in the center of a mesh dish, which assists in focusing radio waves onto the antenna. The bi-quad antenna outperformed the omnidirectional antenna, which had a signal strength of 56%. The results of each antenna test were separately simulated in MATLAB. The combined impact of bi-quad and parabolic was then duplicated using mathematical models, resulting in a unique waveform propagation pattern known as para-quad, which improved performance. A balanced RF power amplifier was conceived and built in this study. A 2.620 - 2.690GHz frequency range on a large signal Si-LDMOS transistor model achieves 53% PAE, 41dBm power output, and 14 dB gain at the P1dB saturation point.
{"title":"Fabrication and optimization of bi-quad antenna and energy-efficient balanced RF power amplifier for 5G-LTE multi-carrier applications","authors":"Isaac Kuma Yeboah, Richard Brace, Kwabena Agyapong-Kondua, Matthew Asiedu, Henrritta Kuma Yeboah","doi":"10.52953/wcqw1171","DOIUrl":"https://doi.org/10.52953/wcqw1171","url":null,"abstract":"Wireless technology is presently one of the most actively researched fields of digital communication systems. Wireless communication technologies are insufficient without an understanding of antenna design and operation. A wide range of radio frequency equipment, including microwave antennas, microwave ovens, cordless telephones, and medical devices, utilize the 2.4 GHz band. In this article, a parabolic mesh dish was used to build and improve a bi-quad antenna with a central working frequency of 2.445 GHz. The bi-quad antenna was put in a parabolic mesh dish to optimize wave propagation. The findings show that the antenna obtained a signal strength range of 70% to 80%, increasing the directivity of WLAN coverage. The bi-quad antenna feed was placed in the center of a mesh dish, which assists in focusing radio waves onto the antenna. The bi-quad antenna outperformed the omnidirectional antenna, which had a signal strength of 56%. The results of each antenna test were separately simulated in MATLAB. The combined impact of bi-quad and parabolic was then duplicated using mathematical models, resulting in a unique waveform propagation pattern known as para-quad, which improved performance. A balanced RF power amplifier was conceived and built in this study. A 2.620 - 2.690GHz frequency range on a large signal Si-LDMOS transistor model achieves 53% PAE, 41dBm power output, and 14 dB gain at the P1dB saturation point.","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129555866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A security incident or rule violation can be detected and documented using forensic analysis, which is made easier by preconfigured views that are enhanced with crucial data. In this paper, we present an advanced visualization mechanism for digital forensics that increases the situational awareness of a security expert by analysing and presenting security events, alarms and critical performance indicators. Using testbeds made available by Fed4FIRE+, we demonstrate an experimentation setup that simulates genuine client settings, including their varying needs and differences in size and requirements. These tests allowed for the parameterization of the variables, which led to rapid and well-documented results that could only be reached by trial and error with potential financial repercussions.
{"title":"Deployment of the Fed4FIRE+ testbed for forensics visualization purposes","authors":"Leonidas Kallipolitis, Panagiotis Katrakazas, Ilias Spais","doi":"10.52953/imxx4520","DOIUrl":"https://doi.org/10.52953/imxx4520","url":null,"abstract":"A security incident or rule violation can be detected and documented using forensic analysis, which is made easier by preconfigured views that are enhanced with crucial data. In this paper, we present an advanced visualization mechanism for digital forensics that increases the situational awareness of a security expert by analysing and presenting security events, alarms and critical performance indicators. Using testbeds made available by Fed4FIRE+, we demonstrate an experimentation setup that simulates genuine client settings, including their varying needs and differences in size and requirements. These tests allowed for the parameterization of the variables, which led to rapid and well-documented results that could only be reached by trial and error with potential financial repercussions.","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130867147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the commercialization of fifth-generation (5G), the rapid popularity of mobile Over-The-Top (OTT) voice applications brings huge impacts on the traditional telecommunication voice call services. Tunnel encryption technology such as Virtual Private Networks (VPNs) allow OTT users to escape the supervision of network operators easily, which may cause potential security risks to cyberspace. To monitor harmful OTT applications in the context of 5G, it is critical to identify encrypted OTT voice traffic. However, there is no comprehensive study on typical OTT voice traffic identification. This paper mainly focuses on analyzing OTT voice traffic in the 5G network specifically. We propose employing Long Short-Term Memory (LSTM) and Convolutional Neural Networks (CNNs) to identify encrypted 5G OTT voice traffic, study the identification performance of used deep learning methods in three different scenarios. To verify the performance of the proposed approach, we collect 28 types of typical OTT and non-OTT voice traffic from the experimental 5G network. Experimental results prove the effectiveness and robustness of the proposed approach in encrypted 5G OTT voice traffic identification.
{"title":"Encrypted 5G over-the-top voice traffic classification using deep learning","authors":"Zhuang Qiao, Shunliang Zhang, Liuqun Zhai, Xiaohui Zhang","doi":"10.52953/eyif3681","DOIUrl":"https://doi.org/10.52953/eyif3681","url":null,"abstract":"With the commercialization of fifth-generation (5G), the rapid popularity of mobile Over-The-Top (OTT) voice applications brings huge impacts on the traditional telecommunication voice call services. Tunnel encryption technology such as Virtual Private Networks (VPNs) allow OTT users to escape the supervision of network operators easily, which may cause potential security risks to cyberspace. To monitor harmful OTT applications in the context of 5G, it is critical to identify encrypted OTT voice traffic. However, there is no comprehensive study on typical OTT voice traffic identification. This paper mainly focuses on analyzing OTT voice traffic in the 5G network specifically. We propose employing Long Short-Term Memory (LSTM) and Convolutional Neural Networks (CNNs) to identify encrypted 5G OTT voice traffic, study the identification performance of used deep learning methods in three different scenarios. To verify the performance of the proposed approach, we collect 28 types of typical OTT and non-OTT voice traffic from the experimental 5G network. Experimental results prove the effectiveness and robustness of the proposed approach in encrypted 5G OTT voice traffic identification.","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"188 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123217129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Athanasios Tsipis, Vasileios Komianos, Konstantinos Oikonomou, Ioannis Stavrakakis
Edge computing has emerged as the next big thing in distributed computing, by extending the cloud paradigm and offering efficient ways to engage with latency-intolerant applications, such as Virtual Reality (VR) multiplayer games. In edge computing, the service providers can benefit from existing cellular infrastructure to deploy services on edge servers that reside in close proximity to the users. Given the limited available budget for edge resource investment, one fundamental problem that manifests is the discovery of a prudent edge allocation strategy, that will efficiently prescribe which users are assigned to which edge servers, in order to tackle application-specific requirements, like minimizing system deployment costs. In this paper, considering the frequent interactions and view inconsistencies occurring among multiple users immersed in the same VR game, we address the problem from the users' perspective, focusing on improving their edge admission rate, resource provisioning and overall fairness, in order to subsequently maximize the average Quality of Experience (QoE). We call this the "Fairness and QoE-Based Edge Allocation" (FQEA) problem, formally formulating its properties and theoretically proving its complexity. However, discovering optimal solutions to the NP-hard FQEA in large-scale VR scenarios is challenging. Hence, we propose FQEA-H, a heuristic algorithm to generate allocation strategies in reasonable time. Comprehensive simulations, conducted on a real-world topological trace, demonstrate how FQEA-H can tackle the problem effectively, generally outperforming both the baseline and state-of-the-art alternatives.
{"title":"Towards fairness and QoE-based edge allocation for multiplayer virtual reality applications in edge computing","authors":"Athanasios Tsipis, Vasileios Komianos, Konstantinos Oikonomou, Ioannis Stavrakakis","doi":"10.52953/vavy1919","DOIUrl":"https://doi.org/10.52953/vavy1919","url":null,"abstract":"Edge computing has emerged as the next big thing in distributed computing, by extending the cloud paradigm and offering efficient ways to engage with latency-intolerant applications, such as Virtual Reality (VR) multiplayer games. In edge computing, the service providers can benefit from existing cellular infrastructure to deploy services on edge servers that reside in close proximity to the users. Given the limited available budget for edge resource investment, one fundamental problem that manifests is the discovery of a prudent edge allocation strategy, that will efficiently prescribe which users are assigned to which edge servers, in order to tackle application-specific requirements, like minimizing system deployment costs. In this paper, considering the frequent interactions and view inconsistencies occurring among multiple users immersed in the same VR game, we address the problem from the users' perspective, focusing on improving their edge admission rate, resource provisioning and overall fairness, in order to subsequently maximize the average Quality of Experience (QoE). We call this the \"Fairness and QoE-Based Edge Allocation\" (FQEA) problem, formally formulating its properties and theoretically proving its complexity. However, discovering optimal solutions to the NP-hard FQEA in large-scale VR scenarios is challenging. Hence, we propose FQEA-H, a heuristic algorithm to generate allocation strategies in reasonable time. Comprehensive simulations, conducted on a real-world topological trace, demonstrate how FQEA-H can tackle the problem effectively, generally outperforming both the baseline and state-of-the-art alternatives.","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128349929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Elias Vathias, Matthias Filippos Doukas, Panagiotis Giannopoulos, Stathes Hadjiefthymiades
This paper focuses on the management and pricing of resources in Content Delivery Networks (CDNs), which are extensively adopted nowadays as a very efficient mechanism for Internet information provision. We elaborate on a resource management model that is aligned with the concepts and mechanisms in capital markets. We use the concept of Stock Options (SOs) to address the scarcity and potential unavailability of CDN resources. Using a Predictive Reservation Scheme (PRS), network resources (traffic volume) are being monitored through kernel estimators in a given time frame. A Secondary Market (SM) significantly improves the efficiency and robustness of the PRS by allowing the fast exchange of unused resources (stocks) and SOs between the Origin Servers (OSs). This exchange can happen by allowing automatic electronic double auctions at the end of each day or at shorter time intervals. As a result, OSs may acquire resources (if needed) at standard prices, avoiding penalizing tariffs for last-minute requests. The efficiency of our prediction reservation scheme further improves.
{"title":"Proactivity in content delivery networks resource management: The stock options case","authors":"Elias Vathias, Matthias Filippos Doukas, Panagiotis Giannopoulos, Stathes Hadjiefthymiades","doi":"10.52953/geew8451","DOIUrl":"https://doi.org/10.52953/geew8451","url":null,"abstract":"This paper focuses on the management and pricing of resources in Content Delivery Networks (CDNs), which are extensively adopted nowadays as a very efficient mechanism for Internet information provision. We elaborate on a resource management model that is aligned with the concepts and mechanisms in capital markets. We use the concept of Stock Options (SOs) to address the scarcity and potential unavailability of CDN resources. Using a Predictive Reservation Scheme (PRS), network resources (traffic volume) are being monitored through kernel estimators in a given time frame. A Secondary Market (SM) significantly improves the efficiency and robustness of the PRS by allowing the fast exchange of unused resources (stocks) and SOs between the Origin Servers (OSs). This exchange can happen by allowing automatic electronic double auctions at the end of each day or at shorter time intervals. As a result, OSs may acquire resources (if needed) at standard prices, avoiding penalizing tariffs for last-minute requests. The efficiency of our prediction reservation scheme further improves.","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114055929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, an energy efficient task offloading mechanism in a Multiaccess Edge Computing (MEC) environment is introduced, based on the principles of contract theory. The technology of Reconfigurable Intelligent Surfaces (RISs) is adopted and serves as the enabler for energy efficient task offloading, from the perspective of location-awareness and improved communication environment. Initially a novel positioning, navigation, and timing solution is designed, based on the RIS technology and an artificial intelligent method that selects a set of RISs to perform the multilateration technique and determine the Internet of Things (IoT) nodes' positions in an efficient and accurate manner is introduced. Being aware of the nodes' positions, a maximization problem of the nodes' sum received signal strength at the MEC server where the nodes offload their computing tasks is formulated and solved, determining each RIS element's optimal phase shifts. Capitalizing on these enhancements, a contract-theoretic task offloading mechanism is devised enabling the MEC server to incentivize the IoT nodes to offload their tasks to it for further processing in an energy efficient manner, while accounting for the improved nodes' communications and computing characteristics. The performance evaluation of the proposed framework is obtained via modeling and simulation under different operation scenarios.
{"title":"Reconfigurable intelligent surfaces-enabled edge computing: A location-aware task offloading framework","authors":"Md Sahabul Hossain, Nafis Irtija, Maria Diamanti, Fisayo Sangoleye, Eirini Eleni Tsiropoulou, Symeon Papavassiliou","doi":"10.52953/fltj9889","DOIUrl":"https://doi.org/10.52953/fltj9889","url":null,"abstract":"In this paper, an energy efficient task offloading mechanism in a Multiaccess Edge Computing (MEC) environment is introduced, based on the principles of contract theory. The technology of Reconfigurable Intelligent Surfaces (RISs) is adopted and serves as the enabler for energy efficient task offloading, from the perspective of location-awareness and improved communication environment. Initially a novel positioning, navigation, and timing solution is designed, based on the RIS technology and an artificial intelligent method that selects a set of RISs to perform the multilateration technique and determine the Internet of Things (IoT) nodes' positions in an efficient and accurate manner is introduced. Being aware of the nodes' positions, a maximization problem of the nodes' sum received signal strength at the MEC server where the nodes offload their computing tasks is formulated and solved, determining each RIS element's optimal phase shifts. Capitalizing on these enhancements, a contract-theoretic task offloading mechanism is devised enabling the MEC server to incentivize the IoT nodes to offload their tasks to it for further processing in an energy efficient manner, while accounting for the improved nodes' communications and computing characteristics. The performance evaluation of the proposed framework is obtained via modeling and simulation under different operation scenarios.","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131926649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The basic design of the Named Data Networking (NDN) architecture is shown to incur problems, in that Interests (content requests) may go unanswered even if content is available in the network, and Pending Interest Tables (PIT) are shown to provide limited performance benefits in the presence of in- network caching. A new approach to content-centric networking is introduced that eliminates the need to maintain PITs while providing the benefits sought by NDN. Content-Centric Networking with Data Answer Routing Table (CCN-DART) replaces PITs with Data Answer Routing Tables (DARTs) to forward Interests that do not state their sources. The size of a DART is proportional to the number of routes used by Interests traversing a router, rather than the number of Interests traversing a router. It is shown that undetected Interest loops cannot occur in CCN-DART, and that Interests and responses to them are forwarded correctly independently of the state of the network. The results of simulation experiments comparing CCN-DART with NDN using the ndnSIM simulation tool show that CCN-DART attains similar or better latencies than NDN when no looping problems occur in NDN, while using a similar number of Interests and storing an order of magnitude fewer forwarding entries.
{"title":"An information-centric networking architecture with small routing tables","authors":"J. J. Aceves, Maziar Mirzazad Barijough","doi":"10.52953/kzex3360","DOIUrl":"https://doi.org/10.52953/kzex3360","url":null,"abstract":"The basic design of the Named Data Networking (NDN) architecture is shown to incur problems, in that Interests (content requests) may go unanswered even if content is available in the network, and Pending Interest Tables (PIT) are shown to provide limited performance benefits in the presence of in- network caching. A new approach to content-centric networking is introduced that eliminates the need to maintain PITs while providing the benefits sought by NDN. Content-Centric Networking with Data Answer Routing Table (CCN-DART) replaces PITs with Data Answer Routing Tables (DARTs) to forward Interests that do not state their sources. The size of a DART is proportional to the number of routes used by Interests traversing a router, rather than the number of Interests traversing a router. It is shown that undetected Interest loops cannot occur in CCN-DART, and that Interests and responses to them are forwarded correctly independently of the state of the network. The results of simulation experiments comparing CCN-DART with NDN using the ndnSIM simulation tool show that CCN-DART attains similar or better latencies than NDN when no looping problems occur in NDN, while using a similar number of Interests and storing an order of magnitude fewer forwarding entries.","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132945832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tarik Taleb, Chafika Benza�d, Miguel Bordallo Lopez, Konstantin Mikhaylov, Sasu Tarkoma, Panos Kostakos, Nurul Huda Mahmood, Pekka Pirinen, Marja Matinmikko-Blue, Matti Latva-aho, Ari Pouttu
The architectures of mobile networks have seen an unprecedented techno-economic transformation, fusing the telcommunications world within the cloud world, adding the spices of Software Engineering to the overall system design, and ultimately yielding the concept of Telco Cloud. This has brought significant benefits in terms of reducing expenditure and operational costs, flexibility in deployment, and a faster time to market. The key enablers are network function virtualization, software-defined networking, and edge/cloud computing. Artificial intelligence is also kicking in this arena. When all these technologies are well integrated, the creation and life-cycle management of fully programmable, flexible, service-tailored, and automated end-to-end network slices/services become possible. This will support diverse 5G and beyond 5G services, spanning from tactile IoT to pervasive robotics and immersive services. This paper introduces an unprecedented and disruptive vision for 6G that shifts the perception of future mobile networks from the old-fashioned concept of "network of networks" towards a new vision of "service of services." The paper then introduces the functional model of the envisioned system architecture, along with its components. It then provides a high-level description of the logical architecture.
{"title":"6G System architecture: A service of services vision","authors":"Tarik Taleb, Chafika Benza�d, Miguel Bordallo Lopez, Konstantin Mikhaylov, Sasu Tarkoma, Panos Kostakos, Nurul Huda Mahmood, Pekka Pirinen, Marja Matinmikko-Blue, Matti Latva-aho, Ari Pouttu","doi":"10.52953/dgko1067","DOIUrl":"https://doi.org/10.52953/dgko1067","url":null,"abstract":"The architectures of mobile networks have seen an unprecedented techno-economic transformation, fusing the telcommunications world within the cloud world, adding the spices of Software Engineering to the overall system design, and ultimately yielding the concept of Telco Cloud. This has brought significant benefits in terms of reducing expenditure and operational costs, flexibility in deployment, and a faster time to market. The key enablers are network function virtualization, software-defined networking, and edge/cloud computing. Artificial intelligence is also kicking in this arena. When all these technologies are well integrated, the creation and life-cycle management of fully programmable, flexible, service-tailored, and automated end-to-end network slices/services become possible. This will support diverse 5G and beyond 5G services, spanning from tactile IoT to pervasive robotics and immersive services. This paper introduces an unprecedented and disruptive vision for 6G that shifts the perception of future mobile networks from the old-fashioned concept of \"network of networks\" towards a new vision of \"service of services.\" The paper then introduces the functional model of the envisioned system architecture, along with its components. It then provides a high-level description of the logical architecture.\u0000","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126931809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Luis M. Contreras, Javier Serrano, Lefteris Mamatas, Giacomo Bernini, Paolo Monti, Mario Antunes, Udayanto Atmojo, Eli Tocker, I�aki Val, Andrea Sgambelluri, J�r�me H�rri, Antonio Lioy, Pedro Martinez-Julia, Jos� Gonz�lez, Jorge S�nchez-Garrido, Hitoshi Asaeda
The transition of the networks to support forthcoming beyond 5G (B5G) and 6G services introduces a number of important architectural challenges that force an evolution of existing operational frameworks. Current networks have introduced technical paradigms such as network virtualization, programmability and slicing, being a trend known as network softwarization. Forthcoming B5G and 6G services imposing stringent requirements will motivate a new radical change, augmenting those paradigms with the idea of smartness, pursuing an overall optimization on the usage of network and compute resources in a zero-trust environment. This paper presents a modular architecture under the concept of Convergent and UBiquitous Intelligent Connectivity (CUBIC), conceived to facilitate the aforementioned transition. CUBIC intends to investigate and innovate on the usage, combination and development of novel technologies to accompany the migration of existing networks towards Convergent and Ubiquitous Intelligent Connectivity (CUBIC) solutions, leveraging Artificial Intelligence (AI) mechanisms and Machine Learning (ML) tools in a totally secure environment.
{"title":"Modular architecture providing convergent and ubiquitous intelligent connectivity for networks beyond 2030","authors":"Luis M. Contreras, Javier Serrano, Lefteris Mamatas, Giacomo Bernini, Paolo Monti, Mario Antunes, Udayanto Atmojo, Eli Tocker, I�aki Val, Andrea Sgambelluri, J�r�me H�rri, Antonio Lioy, Pedro Martinez-Julia, Jos� Gonz�lez, Jorge S�nchez-Garrido, Hitoshi Asaeda","doi":"10.52953/samo3073","DOIUrl":"https://doi.org/10.52953/samo3073","url":null,"abstract":"The transition of the networks to support forthcoming beyond 5G (B5G) and 6G services introduces a number of important architectural challenges that force an evolution of existing operational frameworks. Current networks have introduced technical paradigms such as network virtualization, programmability and slicing, being a trend known as network softwarization. Forthcoming B5G and 6G services imposing stringent requirements will motivate a new radical change, augmenting those paradigms with the idea of smartness, pursuing an overall optimization on the usage of network and compute resources in a zero-trust environment. This paper presents a modular architecture under the concept of Convergent and UBiquitous Intelligent Connectivity (CUBIC), conceived to facilitate the aforementioned transition. CUBIC intends to investigate and innovate on the usage, combination and development of novel technologies to accompany the migration of existing networks towards Convergent and Ubiquitous Intelligent Connectivity (CUBIC) solutions, leveraging Artificial Intelligence (AI) mechanisms and Machine Learning (ML) tools in a totally secure environment.\u0000","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124440014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ETSI ISG Non-IP Networking (NIN) was formed to standardize Flexilink, a networking technology which does not have the problems mobile operators had identified with current technology based on Internet Protocol (IP). This paper reviews the main features of Flexilink and the advantages of the services it provides for future network applications beyond 2030. Internet Protocol is connection-less, so every packet has to carry all the information needed to route it to its destination and this information has to be processed by each router the packet passes through. However, in most cases it is used to carry a "flow" of packets for a connection-oriented protocol such as TCP or RTP. Routing in SDN applies to flows rather than individual packets, but each packet header still contains the same routing information and must be processed to identify the flow to which the packet belongs. Flexilink replaces the per-flow information in the packet header with a pointer into the routing table, which eliminates the need for software processing of packet headers and means that packet formats are not dependent on the addressing scheme used. It also provides a separate service for live media such as audio, video, and tactile that easily achieves the lowest possible latency.
ETSI ISG非IP网络(NIN)是为了标准化Flexilink而成立的,Flexilink是一种网络技术,它不存在移动运营商认为基于互联网协议(IP)的现有技术存在的问题。本文综述了Flexilink的主要特点及其为2030年后的未来网络应用提供的服务优势。互联网协议是无连接的,所以每个数据包都必须携带路由到目的地所需的所有信息,并且这些信息必须由数据包经过的每个路由器处理。然而,在大多数情况下,它被用来为面向连接的协议(如TCP或RTP)携带数据包的“流”。SDN中的路由适用于流而不是单个数据包,但每个数据包头仍然包含相同的路由信息,必须经过处理以确定数据包所属的流。Flexilink用一个指向路由表的指针取代了包头中的每流信息,这消除了对包头的软件处理的需要,并且意味着包格式不依赖于所使用的寻址方案。它还为音频、视频和触觉等实时媒体提供了单独的服务,可以轻松实现尽可能低的延迟。
{"title":"New networking technology in ETSI ISG NIN","authors":"John S Grant","doi":"10.52953/cpud9962","DOIUrl":"https://doi.org/10.52953/cpud9962","url":null,"abstract":"ETSI ISG Non-IP Networking (NIN) was formed to standardize Flexilink, a networking technology which does not have the problems mobile operators had identified with current technology based on Internet Protocol (IP). This paper reviews the main features of Flexilink and the advantages of the services it provides for future network applications beyond 2030. Internet Protocol is connection-less, so every packet has to carry all the information needed to route it to its destination and this information has to be processed by each router the packet passes through. However, in most cases it is used to carry a \"flow\" of packets for a connection-oriented protocol such as TCP or RTP. Routing in SDN applies to flows rather than individual packets, but each packet header still contains the same routing information and must be processed to identify the flow to which the packet belongs. Flexilink replaces the per-flow information in the packet header with a pointer into the routing table, which eliminates the need for software processing of packet headers and means that packet formats are not dependent on the addressing scheme used. It also provides a separate service for live media such as audio, video, and tactile that easily achieves the lowest possible latency.\u0000","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128940923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}