SlideShare a Scribd company logo
1 of 67
Andrea Zanella,
zanella@dei.unipd.it
University of Padova (ITALY)
A high level perspective on 5G
technologies and applications
Main research areas…
Next generation mobile & IoT
Underwater communications Cognitive Networks
Energy harvesting & smart grids
Future Internet Security
Plus more exotic stuff…
Future Internet Security
Contacts
Andrea Zanella –
zanella@dei.unipd.it
 Human Inspired Technologies (HIT)
 Dep. of Information Engineering (DEI)
 SIGNET research group
 office: +39 049 8277770
fax : +39 049 8277699
 email: zanella@dei.unipd.it
 web : http://www.dei.unipd.it/~zanella
4
THE (SHORT) HISTORY
OF CELLULAR
SYSTEMS
Future Internet Security
From 1G to 4G
Cellular
network
concept &
analogue
communication
s
1G - TACS
Digital
communication
and
centralized
Network
Control
2G - GSM
• Multi-Rate &
Adaptive
Modulation and
Coding
• Scheduling &
Fairness
• Soft Handover
3G - UMTS
• Channel
Aggregation
• Small cells &
Network
densification
• MIMO & Comp
4G - LTE
Future Internet Security
From 1G to 4G
 1G: established seamless mobile connectivity
introducing mobile voice services
 2G: introduced the multi standards (GSM,
CDMAone), applied frequency reuse
 3G: optimized mobile for data enabling mobile
broadband services with faster and better
connectivity
 4G: more capacity with faster & better mobile
broadband experiences
Future Internet Security
4G capacity evolution
 4G started with 150 Mbps with contiguous 20 MHz band
 Latest devices supports already 600 Mbps
 Chipset capability allows 1 Gbps devices already in end
2017 which requires typically 80-100 MHz spectrum
Future Internet Security
Where does 4G fall short?
 4G monolithic ‘one-fit-all’ architecture cannot
actually meet very disparate service
requirements
 4G cannot provide truly differentiated
services while maintaining high efficiency
 Latency, capacity, & reliability do not match
the requirements of most challenging new
applications
Future Internet Security
Which applications?
Source: NGMN Alliance, "NGMN 5G White Paper" - v1.0, 17th February, 2015
https://www.ngmn.org/uploads/media/NGMN_5G_White_Paper_V1_0.pdfFuture Internet Security
5G Latency requirements
per type of service
Future Internet Security
WHAT DO WE EXPECT
FROM 5G?
Future Internet Security
User perspective
 Infinite capacity
 Everyone gets enough to be “happy”!
 Ubiquitous coverage
 No more connectivity gaps
 Pervasive connectivity
 “Every” object is Internet-enabled
 Customization
 Services adapt to the context and the personal
requirements
 Flexibility
 Easy development and integration of new services
Future Internet Security
Technical requirements
 Infinite capacity
 Everyone gets
enough to be happy
 More data rate
 Higher spectrum
efficiency
 More spatial reuse
 QoE-based RRM
 Dynamic content
caching
 …
User demands Engineers answer…
Future Internet Security
Technical requirements
 ubiquitous
coverage
 No more connectivity
gaps!
 multiple RATs
 new frequency bands
 multiple antennae &
beamforming
 cell densification
 higher sensitivity
 better handover
 …
User demands Engineers answers
Future Internet Security
Technical requirements
 pervasive
connectivity
 “Every” object is
Internet-enabled
 protocols protocols
protocols!
 6LowPAN, RPL,
CoAP,…
 massive access
management
 energy efficiency
 security
 …
Engineers answersUser demands
Future Internet Security
Technical requirements
 customization
 Services adapt to the
context and the
personal
requirements
 software adaptability
 quality of experience
 service differentiation
 context awareness
 Machine learning
 Unsupervised learning
 Emergent behavior, …
User demands Engineers answers
Future Internet Security
Technical requirements
 flexibility
 Easy development
and integration of
new services
 semantic web
 Ontologies
 data accessibility
 heterogeneous sources
 wideband services
(voice, video, web,…)
 machine-type devices
 Highly mobile users
(VANET, trains,…)
User demands Engineers answers
Future Internet Security
Requirements on 5G
1000x more data rates
Towards 0-5ms E2E latency
1M/km2 devices
500km/h high mobility
99.999% reliability
<90’ service deployment
time
90% energy efficiency
Source: 5G-PPP (https://5g-ppp.eu/)
Future Internet Security
The basic ingredients
Next
generation
of ICT
Advanced
PHY
Native
MTD
support
HetNets &
multi-RAN
Software
defined
networks
Cognition
& machine
learning
Future Internet Security
More CAPACITY
 A single user-centric view
 Current coding techniques are very close to the
theoretical Shannon spectral efficiency bounds
for single user capacity
 Most techniques for 5G increase the bandwidth
and degrees of freedom to exploit diversity
Future Internet Security
More capacity
• Small cells,
Relays, mobile
Relays and
Drones
• larger bandwidth
per user in each
cell
Densification
• new spectrum @
higher
frequencies
(above 6 GHz)
• mmWave
• Visible Light
Communications
More bandwidth
• Massive MIMO
• Dynamic
beamforming
• Spectrum
sharing
• Multiple-RATs
More antennas
Future Internet Security
Network densification
Future Internet Security
Classic Challenges:
1. Interference
• Cross-tier & co-tier
• Near-far effect
2. Uncoordinated operations
• Inter-cell interference
• Mobility management
New Challenges:
3. Unplanned deployment
• Overlaying coverage
• Over-dimensioned
capacity
4. Energy consumption
• High number of always
on APs
• Traffic unbalance at APs
Massive MIMO
 Massive MIMO use a large arrays at BSs
 e.g., 𝑁≈200 antennas, 𝐾≈40 users
 Key: Excessive number of antennas, 𝑁≫𝐾
 Very narrow beamforming
 Little interference leakage
 Disruptive for 5G
 Channel Estimation is critical
Future Internet Security
More spectrum
 New frequency bands
 mm-Wave communications (3 to 300 GHz)
 5 – 9 GHz of unlicensed bandwidth
 Ever heard of WiGig (IEEE 802.11ad)?
 1 Gbps at 60 GHz
 http://www.wi-fi.org/discover-wi-fi/wigig-certified
 Very sensitive to blockage…
Future Internet Security
 Causes of blocking
 Human body shadowing
 Object blocking
 Types of blocking
 Short term blocking: shorter than the tolerable time to
live of the service
 Long term blocking: is longer than the tolerable time to
live of the service
mmW channel intermittency
due to blocking
Future Internet Security
Counteract strategies
 With Short term blockages:
 Catch up approach: compensate the time lost for
blockage with higher average information
transmission rate
 Multi-link communications over same or different Radio
Access Technologies (RATs) such as LTE, 5G, WiFi,…
 Overprovisioning of resources
 With Long term blockages:
 Overprovisioning is not sufficient
 Make offloading robust by
 Multi-link communications for spatial error-correcting
codes with resource overprovisioning
 Block erasure channel code design over multi-links
Future Internet Security
Spectrum Scenario: Future
Landscape
 Multiple frequencies bands: dedicated licensed
spectrum complemented with various forms of
shared spectrum
“Toolbox” of different sharing enablers required
In order for 5G system to work under such scenarios
Future Internet Security
Massive Access
Next
generation
of ICT
Advanced
PHY
Native
MTD
support
HetNets &
multi-RAN
Software
defined
networks
Cognition
& machine
learning
Future Internet Security
M2M reference architecture
Future Internet Security
Machine Network Traffic
 M2M devices generate traffic of the following
types
 Periodic: smart metering application
 Event-driven: emergency event report
 Continuous: surveillance camera
 Large volume of different types of traffic at
core network
 Guarantee of diverse QoS traffic requirements
 Reliability of both human-to-human and M2M
traffic
Future Internet Security 37
high-speed wireless vs.
M2M
 high-speed systems built from information-theoretic
principles with small control info and large data
 M2M requires short data packets
from massive number of devices
each transmitting sporadically
Future Internet Security 40
The issue of short packets
 Today’s cellular systems are designed mainly
for broadband traffic sources
 Can easily accommodate 5 clients transmitting at
2 Mbit/s each, but not 10.000 clients transmitting
at 1kbit/s
 Coding and control overhead may become
predominant
 Preambles for channel estimation may be longer
than data payload!
Future Internet Security 41
wireless M2M
 some challenges:
 highly reliable connections despite coverage problems
 low latency
 long battery lifetime
 massive number of nodes with sporadic use
 some opportunities:
 correlation of machine-type data across space and time
 predictability and/or periodicity of data/control traffic
 header compression using implicit/context information
 advanced PHY/MAC techniques
Future Internet Security 42
Densification and
diversification
Next
generation
of ICT
Advanced
PHY
Native
MTD
support
HetNets &
multi-RAN
Software
defined
networks
Cognition
& machine
learning
Future Internet Security
HetNets & multi-RAN
 Heterogeneous networks (HetNets):
 Small cell networks including macrocells and
small cells of all types
 Provide improved spectrum efficiency
(bps/Hz/km2), capacity, and coverage
 Small cells can support wireless applications for
homes and enterprises as well as metropolitan
and rural public spaces
 Require solutions for cell selection, handover,
dynamic content caching, …
Future Internet Security 44
Next
generation
of ICT
Advanced
PHY
Native
MTD
support
HetNets &
multi-RAN
Software
defined
networks
Cognition
& machine
learning
Softwarization & Cloudification
Future Internet Security
Planes of Networking (1/2)
 Data Plane
 All activities involving as well as resulting from data
packets sent by the end user, e.g.,
 Forwarding
 Fragmentation and reassembly
 Replication for multicasting
 Control Plane
 All activities that are necessary to perform data plane
activities but do not involve end-user data packets
 Making routing tables
 Setting packet handling policies (e.g., security)
 Base station beacons announcing availability of services
Ref: Open Data Center Alliance Usage Model: Software Defined Networking Rev 1.0,”
http://www.opendatacenteralliance.org/docs/Software_Defined_Networking_Master_Usage_Model_Rev1.0.pdfFuture Internet Security
Data vs control planes
 Data plane runs at line rate
 e.g., 100 Gbps for 100 Gbps Ethernet  Fast
Path
 Typically implemented using special hardware
 Few activities handled by CPU in switch  Slow
path
 e.g., Broadcast, Unknown, and Multicast (BUM) traffic
 All control activities are generally handled by
CPU
Future Internet Security
OpenFlow key idea
 Separation of control and data planes
 Centralization of control
 Flow based control
 Control logic is moved to a controller
 Switches only have forwarding elements
 One expensive controller with a lot of cheap
switches
 OpenFlow is the protocol to send/receive
forwarding rules from controller to switches
•Ref: N. McKeown, et al., ``OpenFlow: Enabling Innovation in Campus Networks," ACM SIGCOMM CCR, Vol. 38, No. 2, April 2008, pp. 69-74.Future Internet Security
OpenFlow basics
 One packet arrives to the switch
 Switch logic compares header fields with flow
entries in a table
 if any entry matches  take indicated actions
 If no header match 
 packet is queued and header is sent to the controller
 Controller sends a new rule to the switch
 subsequent packets of the flow are handled by this rule
 Doesn’t all of this sound somehow familiar?
Ref: N. McKeown, et al., ``OpenFlow: Enabling Innovation in Campus Networks," ACM SIGCOMM CCR, Vol. 38, No. 2, April 2008, pp. 69-74.Future Internet Security
What do we need SDN for?
① Virtualization: Use network resource without worrying about
where it is physically located, how much it is, how it is
organized, etc.
② Orchestration: Manage thousands of devices
③ Programmable: Should be able to change behavior on the fly
④ Dynamic Scaling: Should be able to change size, quantity
⑤ Automation: Lower OpEx
⑥ Visibility: Monitor resources, connectivity
⑦ Performance: Optimize network device utilization
⑧ Multi-tenancy: Sharing expensive infrastructure
⑨ Service Integration
⑩ Openness: Full choice of Modular plug-ins
⑪ Unified management of computing, networking, and storage
http://www.cse.wustl.edu/~jain/tutorials/icc14.htmFuture Internet Security
5G is changing ‘the
Equation’
The issue of 5G is not only more capacity but also
more reactive, smart and connected devices
5G is changing ‘the
Equation’
“Latency” is based on 3 major component:
transmission delay + routing and switching + IT response time
Wireless / Wired Processing and Storage
Future Internet Security
Local processing to reduce
the latency: the ECM
Future Internet Security
Latency reduction versus
reliability
Future Internet Security
Machine Learning
Next
generation
of ICT
Advanced
PHY
Native
MTD
support
HetNets &
multi-RAN
Software
defined
networks
Cognition
& machine
learning
Future Internet Security
The cognition cycle
Sense
LearnAct
Future Internet Security
True for human, true for
networks
 Sense: nowadays devices are crammed with
transducers/sensing apparatuses
needs efficient data handling
 Learn: optimization algorithms can be run at
each node individually
needs (i) efficient algos (ii) harmonization
 Act: network modifies the environment
requires convergence of multiple devices
Future Internet Security
Cognition-based Network
Each node of the network:
 exploits local information to achieve its goal
 shares it with its neighbors
Self-adaptation to the environment to achieve
network wide goals
Cognition applied to the entire network
Future Internet Security
Multimedia growth
source:
Cisco report
(2014)
Future Internet Security
Analysis
 We consider a test set of 38 video clips, all
encoded in an H.264-AVC format
 All the videos are encoded with a 16-frame
structure (1 I-frame, 15 P-frames) and
compressed with 18 different rates
 Depending on the content, the perceived
quality of a compressed version changes
We used the SSIM indicator to capture it
Future Internet Security
SSIM versus rate
SelfSimilarityIndex(SSIM)
r=log(actual rate/original rate)Future Internet Security
Requirements for video
delivery
 QoE-based and content-aware resource
allocation
 Rate-distortion curve depends on video content
 Video content affects size of the encoded video
frames
 RBM can be used to infer rate-distortion curve of
a video by observing the size (not the content) of
video frames
Future Internet Security
“Our” Video Classes
Future Internet Security
QoE-aware proxy vs legacy
video clients
Future Internet Security
WHAT’S ABOUT 5G
SECURITY?
Winter is coming…
Future Internet Security
Cloudification/Softwarizatio
n
 Cloudification
 In legacy networks, security of function network
elements relies largely on physical protection
 In 5G, virtual network elements will run on cloud-
based infrastructure  5G infrastructure security
must be taken into consideration!
 Softwarization
 SDN improves flexibility, but introduces single point-
of-failure issues
 Network slicing isolates applications to provide better
service differentiation. Source traffic policing
becomes an issue
Future Internet Security
Heterogeneous access
 Multi-RAT but also multi-network
 Issue: building security architecture suitable for
different access technologies
 IoT devices represent a security threat
 many ways to access networks (directly, via a
gateway, or through a multi-hop mesh)  need to
develop security trans-technology mechanisms
 security management must be efficient and
lightweight
Future Internet Security
Low-Delay Mobility Security
 Vehicles network,
remote surgery,…
require high reliability
with a delay < 1 ms,
also in mobility
 Need for fast security
algos and mobility
security may be
redesigned &
optimized for 5G
Future Internet Security
Pervasivity & privacy
 IoT is gonna spread basically everywhere,
and it is already in most of our houses
 Smartphones, google/amazon assistants, smart
lighting, surveillance systems, roomba…
 a great amount of user privacy information
will be carried over the 5G network  any
information leak may lead to severe
consequences
Future Internet Security
Technologies & privacy
 mmWaves,
beamtracking, RF
tomografy, … a lot
of private
information can be
obtain from (or
wormed out of)
radio signals
analysis
Future Internet Security
Technology frailties
 mmWave: can provide
ultra-fast directional links,
but it is easy to block
 Reflecting surfaces may
help improve coverage or
confuse
tracking/beamforming
algos
 ML can be used to solve
very complex problems,
but their black-box nature
raises questions about
their trustability
Future Internet Security
CVPR 2018
Robust Physical-World Attacks on Deep
Learning Visual Classification
Conclusions
 Today IT and telco are converging
 Telcos are requested to support a large and
rapidly expanding set of applications/services
 Telco need to define new models to valorize their
infrastructure
 The new trend: telcos are becoming more
cloud platforms than just a communication
system
 Trillions of devices are expected to be connected
in the next years
Future Internet Security
Conclusions
 This revolution will bring along a wealth of
new applications and technologies that will
open new business cases, application
scenarios, research opportunities…
 but… we all have to bear in mind
one
important
thing…
Future Internet Security
Future Internet SecurityGame of Thrones Night King mural by Jonas Never at Brennan's | Photo: @never1959, Instagram
The author wishes to thank Dr. Emilio Calvanese
Strinati of CEA-LETI for contributing a few slides
and ideas to this presentation
Acknowledgments

More Related Content

What's hot

Introduction to 5G
Introduction to 5GIntroduction to 5G
Introduction to 5GAli Nikfal
 
IOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA GlobalIOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA GlobalGaganpreet Singh Walia
 
Digital Mobile Network Evolution - from GSM to 5G
Digital Mobile Network Evolution - from GSM to 5GDigital Mobile Network Evolution - from GSM to 5G
Digital Mobile Network Evolution - from GSM to 5G3G4G
 
Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 2019
Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 2019Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 2019
Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 20193G4G
 
Ultra-Reliable Networks – A Mobile Operator Perspective
Ultra-Reliable Networks – A Mobile Operator PerspectiveUltra-Reliable Networks – A Mobile Operator Perspective
Ultra-Reliable Networks – A Mobile Operator Perspective3G4G
 
Intermediate: 5G Network Architecture Options (Updated)
Intermediate: 5G Network Architecture Options (Updated)Intermediate: 5G Network Architecture Options (Updated)
Intermediate: 5G Network Architecture Options (Updated)3G4G
 
5G Technology Tutorial
5G Technology Tutorial5G Technology Tutorial
5G Technology TutorialAPNIC
 
Towards a New Internet for the Year 2030 and Beyond
Towards a New Internet for the Year 2030 and BeyondTowards a New Internet for the Year 2030 and Beyond
Towards a New Internet for the Year 2030 and Beyond3G4G
 
Making 5G NR(New Radio) a commercial reality
Making 5G NR(New Radio) a commercial realityMaking 5G NR(New Radio) a commercial reality
Making 5G NR(New Radio) a commercial realityQualcomm Research
 
5G_NR_Overview_Architecture_and_Operating_Modes
5G_NR_Overview_Architecture_and_Operating_Modes5G_NR_Overview_Architecture_and_Operating_Modes
5G_NR_Overview_Architecture_and_Operating_ModesAalekh Jain
 
5g cellular communication
5g cellular communication5g cellular communication
5g cellular communicationshubham patil
 
5G technical_overview_training_sec_1
5G technical_overview_training_sec_15G technical_overview_training_sec_1
5G technical_overview_training_sec_1Sajal Kumar Das
 
UK Spectrum Policy Forum - Barry Lewis, Samsung - 5G Mobile Communications fo...
UK Spectrum Policy Forum - Barry Lewis, Samsung - 5G Mobile Communications fo...UK Spectrum Policy Forum - Barry Lewis, Samsung - 5G Mobile Communications fo...
UK Spectrum Policy Forum - Barry Lewis, Samsung - 5G Mobile Communications fo...techUK
 
5G: The Future of Telecom
5G: The Future of Telecom5G: The Future of Telecom
5G: The Future of TelecomRishabh Sinha
 

What's hot (20)

Introduction to 5G
Introduction to 5GIntroduction to 5G
Introduction to 5G
 
An introduction to 5G
An introduction to 5GAn introduction to 5G
An introduction to 5G
 
Presentation 5G high school
Presentation 5G high schoolPresentation 5G high school
Presentation 5G high school
 
IOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA GlobalIOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA Global
 
EuCNC2019 workshop6
EuCNC2019 workshop6EuCNC2019 workshop6
EuCNC2019 workshop6
 
Evolution to 5G happens Now
Evolution to 5G happens NowEvolution to 5G happens Now
Evolution to 5G happens Now
 
Digital Mobile Network Evolution - from GSM to 5G
Digital Mobile Network Evolution - from GSM to 5GDigital Mobile Network Evolution - from GSM to 5G
Digital Mobile Network Evolution - from GSM to 5G
 
Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 2019
Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 2019Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 2019
Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 2019
 
5 g link budget
5 g link budget5 g link budget
5 g link budget
 
Ultra-Reliable Networks – A Mobile Operator Perspective
Ultra-Reliable Networks – A Mobile Operator PerspectiveUltra-Reliable Networks – A Mobile Operator Perspective
Ultra-Reliable Networks – A Mobile Operator Perspective
 
Intermediate: 5G Network Architecture Options (Updated)
Intermediate: 5G Network Architecture Options (Updated)Intermediate: 5G Network Architecture Options (Updated)
Intermediate: 5G Network Architecture Options (Updated)
 
5G Technology Tutorial
5G Technology Tutorial5G Technology Tutorial
5G Technology Tutorial
 
Towards a New Internet for the Year 2030 and Beyond
Towards a New Internet for the Year 2030 and BeyondTowards a New Internet for the Year 2030 and Beyond
Towards a New Internet for the Year 2030 and Beyond
 
Making 5G NR(New Radio) a commercial reality
Making 5G NR(New Radio) a commercial realityMaking 5G NR(New Radio) a commercial reality
Making 5G NR(New Radio) a commercial reality
 
Making 5G NR a reality
Making 5G NR a realityMaking 5G NR a reality
Making 5G NR a reality
 
5G_NR_Overview_Architecture_and_Operating_Modes
5G_NR_Overview_Architecture_and_Operating_Modes5G_NR_Overview_Architecture_and_Operating_Modes
5G_NR_Overview_Architecture_and_Operating_Modes
 
5g cellular communication
5g cellular communication5g cellular communication
5g cellular communication
 
5G technical_overview_training_sec_1
5G technical_overview_training_sec_15G technical_overview_training_sec_1
5G technical_overview_training_sec_1
 
UK Spectrum Policy Forum - Barry Lewis, Samsung - 5G Mobile Communications fo...
UK Spectrum Policy Forum - Barry Lewis, Samsung - 5G Mobile Communications fo...UK Spectrum Policy Forum - Barry Lewis, Samsung - 5G Mobile Communications fo...
UK Spectrum Policy Forum - Barry Lewis, Samsung - 5G Mobile Communications fo...
 
5G: The Future of Telecom
5G: The Future of Telecom5G: The Future of Telecom
5G: The Future of Telecom
 

Similar to A high level perspective on 5G technologies and applications

UK Spectrum Policy Forum - Professor Rahim Tafazolli, University of Surrey: 5...
UK Spectrum Policy Forum - Professor Rahim Tafazolli, University of Surrey: 5...UK Spectrum Policy Forum - Professor Rahim Tafazolli, University of Surrey: 5...
UK Spectrum Policy Forum - Professor Rahim Tafazolli, University of Surrey: 5...techUK
 
Chp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techChp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techcheqala5626
 
IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17
IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17
IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17Ed Hightower
 
5G NETWORKS and 5G WIRELESS TECHNOLOGY
5G NETWORKS and 5G WIRELESS TECHNOLOGY5G NETWORKS and 5G WIRELESS TECHNOLOGY
5G NETWORKS and 5G WIRELESS TECHNOLOGYoishimustafi1
 
Ultra Dense Netwok
Ultra Dense NetwokUltra Dense Netwok
Ultra Dense NetwokBUBT
 
A Survey on Key Technology Trends for 5G Networks
A Survey on Key Technology Trends for 5G NetworksA Survey on Key Technology Trends for 5G Networks
A Survey on Key Technology Trends for 5G NetworksCPqD
 
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Jiunn-Jer Sun
 
Presentation on Wireless devices
Presentation on Wireless devicesPresentation on Wireless devices
Presentation on Wireless devicesUnhappy Verse
 
Frontiers of Wireless and Mobile Communications
Frontiers of Wireless and Mobile CommunicationsFrontiers of Wireless and Mobile Communications
Frontiers of Wireless and Mobile CommunicationsSai Varrshini
 
92863888 5g-technology-ppt-by-nasar
92863888 5g-technology-ppt-by-nasar92863888 5g-technology-ppt-by-nasar
92863888 5g-technology-ppt-by-nasarNasar Mohammed
 
SCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONS
SCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONSSCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONS
SCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONSijasuc
 
SCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONS
SCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONSSCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONS
SCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONSijasuc
 
SCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONS
SCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONSSCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONS
SCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONSijasuc
 
SCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONS
SCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONSSCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONS
SCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONSijasuc
 

Similar to A high level perspective on 5G technologies and applications (20)

UK Spectrum Policy Forum - Professor Rahim Tafazolli, University of Surrey: 5...
UK Spectrum Policy Forum - Professor Rahim Tafazolli, University of Surrey: 5...UK Spectrum Policy Forum - Professor Rahim Tafazolli, University of Surrey: 5...
UK Spectrum Policy Forum - Professor Rahim Tafazolli, University of Surrey: 5...
 
Chp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techChp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce tech
 
IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17
IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17
IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17
 
5 g technology
5 g technology5 g technology
5 g technology
 
5G 2
5G 25G 2
5G 2
 
5G NETWORKS and 5G WIRELESS TECHNOLOGY
5G NETWORKS and 5G WIRELESS TECHNOLOGY5G NETWORKS and 5G WIRELESS TECHNOLOGY
5G NETWORKS and 5G WIRELESS TECHNOLOGY
 
Last Mile Access Technologies
Last Mile Access TechnologiesLast Mile Access Technologies
Last Mile Access Technologies
 
Ultra Dense Netwok
Ultra Dense NetwokUltra Dense Netwok
Ultra Dense Netwok
 
A Survey on Key Technology Trends for 5G Networks
A Survey on Key Technology Trends for 5G NetworksA Survey on Key Technology Trends for 5G Networks
A Survey on Key Technology Trends for 5G Networks
 
5 G Wireless Technology
5 G Wireless Technology5 G Wireless Technology
5 G Wireless Technology
 
Lecture1
Lecture1Lecture1
Lecture1
 
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018
 
Presentation on Wireless devices
Presentation on Wireless devicesPresentation on Wireless devices
Presentation on Wireless devices
 
Frontiers of Wireless and Mobile Communications
Frontiers of Wireless and Mobile CommunicationsFrontiers of Wireless and Mobile Communications
Frontiers of Wireless and Mobile Communications
 
92863888 5g-technology-ppt-by-nasar
92863888 5g-technology-ppt-by-nasar92863888 5g-technology-ppt-by-nasar
92863888 5g-technology-ppt-by-nasar
 
5 g
5 g5 g
5 g
 
SCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONS
SCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONSSCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONS
SCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONS
 
SCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONS
SCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONSSCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONS
SCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONS
 
SCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONS
SCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONSSCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONS
SCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONS
 
SCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONS
SCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONSSCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONS
SCALABILITY CONCERNS OF CHIRP SPREAD SPECTRUM FOR LPWAN APPLICATIONS
 

Recently uploaded

UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 

Recently uploaded (20)

Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 

A high level perspective on 5G technologies and applications

  • 1. Andrea Zanella, zanella@dei.unipd.it University of Padova (ITALY) A high level perspective on 5G technologies and applications
  • 2. Main research areas… Next generation mobile & IoT Underwater communications Cognitive Networks Energy harvesting & smart grids Future Internet Security
  • 3. Plus more exotic stuff… Future Internet Security
  • 4. Contacts Andrea Zanella – zanella@dei.unipd.it  Human Inspired Technologies (HIT)  Dep. of Information Engineering (DEI)  SIGNET research group  office: +39 049 8277770 fax : +39 049 8277699  email: zanella@dei.unipd.it  web : http://www.dei.unipd.it/~zanella 4
  • 5. THE (SHORT) HISTORY OF CELLULAR SYSTEMS Future Internet Security
  • 6. From 1G to 4G Cellular network concept & analogue communication s 1G - TACS Digital communication and centralized Network Control 2G - GSM • Multi-Rate & Adaptive Modulation and Coding • Scheduling & Fairness • Soft Handover 3G - UMTS • Channel Aggregation • Small cells & Network densification • MIMO & Comp 4G - LTE Future Internet Security
  • 7. From 1G to 4G  1G: established seamless mobile connectivity introducing mobile voice services  2G: introduced the multi standards (GSM, CDMAone), applied frequency reuse  3G: optimized mobile for data enabling mobile broadband services with faster and better connectivity  4G: more capacity with faster & better mobile broadband experiences Future Internet Security
  • 8. 4G capacity evolution  4G started with 150 Mbps with contiguous 20 MHz band  Latest devices supports already 600 Mbps  Chipset capability allows 1 Gbps devices already in end 2017 which requires typically 80-100 MHz spectrum Future Internet Security
  • 9. Where does 4G fall short?  4G monolithic ‘one-fit-all’ architecture cannot actually meet very disparate service requirements  4G cannot provide truly differentiated services while maintaining high efficiency  Latency, capacity, & reliability do not match the requirements of most challenging new applications Future Internet Security
  • 10. Which applications? Source: NGMN Alliance, "NGMN 5G White Paper" - v1.0, 17th February, 2015 https://www.ngmn.org/uploads/media/NGMN_5G_White_Paper_V1_0.pdfFuture Internet Security
  • 11. 5G Latency requirements per type of service Future Internet Security
  • 12. WHAT DO WE EXPECT FROM 5G? Future Internet Security
  • 13. User perspective  Infinite capacity  Everyone gets enough to be “happy”!  Ubiquitous coverage  No more connectivity gaps  Pervasive connectivity  “Every” object is Internet-enabled  Customization  Services adapt to the context and the personal requirements  Flexibility  Easy development and integration of new services Future Internet Security
  • 14. Technical requirements  Infinite capacity  Everyone gets enough to be happy  More data rate  Higher spectrum efficiency  More spatial reuse  QoE-based RRM  Dynamic content caching  … User demands Engineers answer… Future Internet Security
  • 15. Technical requirements  ubiquitous coverage  No more connectivity gaps!  multiple RATs  new frequency bands  multiple antennae & beamforming  cell densification  higher sensitivity  better handover  … User demands Engineers answers Future Internet Security
  • 16. Technical requirements  pervasive connectivity  “Every” object is Internet-enabled  protocols protocols protocols!  6LowPAN, RPL, CoAP,…  massive access management  energy efficiency  security  … Engineers answersUser demands Future Internet Security
  • 17. Technical requirements  customization  Services adapt to the context and the personal requirements  software adaptability  quality of experience  service differentiation  context awareness  Machine learning  Unsupervised learning  Emergent behavior, … User demands Engineers answers Future Internet Security
  • 18. Technical requirements  flexibility  Easy development and integration of new services  semantic web  Ontologies  data accessibility  heterogeneous sources  wideband services (voice, video, web,…)  machine-type devices  Highly mobile users (VANET, trains,…) User demands Engineers answers Future Internet Security
  • 19. Requirements on 5G 1000x more data rates Towards 0-5ms E2E latency 1M/km2 devices 500km/h high mobility 99.999% reliability <90’ service deployment time 90% energy efficiency Source: 5G-PPP (https://5g-ppp.eu/) Future Internet Security
  • 20. The basic ingredients Next generation of ICT Advanced PHY Native MTD support HetNets & multi-RAN Software defined networks Cognition & machine learning Future Internet Security
  • 21. More CAPACITY  A single user-centric view  Current coding techniques are very close to the theoretical Shannon spectral efficiency bounds for single user capacity  Most techniques for 5G increase the bandwidth and degrees of freedom to exploit diversity Future Internet Security
  • 22. More capacity • Small cells, Relays, mobile Relays and Drones • larger bandwidth per user in each cell Densification • new spectrum @ higher frequencies (above 6 GHz) • mmWave • Visible Light Communications More bandwidth • Massive MIMO • Dynamic beamforming • Spectrum sharing • Multiple-RATs More antennas Future Internet Security
  • 23. Network densification Future Internet Security Classic Challenges: 1. Interference • Cross-tier & co-tier • Near-far effect 2. Uncoordinated operations • Inter-cell interference • Mobility management New Challenges: 3. Unplanned deployment • Overlaying coverage • Over-dimensioned capacity 4. Energy consumption • High number of always on APs • Traffic unbalance at APs
  • 24. Massive MIMO  Massive MIMO use a large arrays at BSs  e.g., 𝑁≈200 antennas, 𝐾≈40 users  Key: Excessive number of antennas, 𝑁≫𝐾  Very narrow beamforming  Little interference leakage  Disruptive for 5G  Channel Estimation is critical Future Internet Security
  • 25. More spectrum  New frequency bands  mm-Wave communications (3 to 300 GHz)  5 – 9 GHz of unlicensed bandwidth  Ever heard of WiGig (IEEE 802.11ad)?  1 Gbps at 60 GHz  http://www.wi-fi.org/discover-wi-fi/wigig-certified  Very sensitive to blockage… Future Internet Security
  • 26.  Causes of blocking  Human body shadowing  Object blocking  Types of blocking  Short term blocking: shorter than the tolerable time to live of the service  Long term blocking: is longer than the tolerable time to live of the service mmW channel intermittency due to blocking Future Internet Security
  • 27. Counteract strategies  With Short term blockages:  Catch up approach: compensate the time lost for blockage with higher average information transmission rate  Multi-link communications over same or different Radio Access Technologies (RATs) such as LTE, 5G, WiFi,…  Overprovisioning of resources  With Long term blockages:  Overprovisioning is not sufficient  Make offloading robust by  Multi-link communications for spatial error-correcting codes with resource overprovisioning  Block erasure channel code design over multi-links Future Internet Security
  • 28. Spectrum Scenario: Future Landscape  Multiple frequencies bands: dedicated licensed spectrum complemented with various forms of shared spectrum “Toolbox” of different sharing enablers required In order for 5G system to work under such scenarios Future Internet Security
  • 29. Massive Access Next generation of ICT Advanced PHY Native MTD support HetNets & multi-RAN Software defined networks Cognition & machine learning Future Internet Security
  • 31. Machine Network Traffic  M2M devices generate traffic of the following types  Periodic: smart metering application  Event-driven: emergency event report  Continuous: surveillance camera  Large volume of different types of traffic at core network  Guarantee of diverse QoS traffic requirements  Reliability of both human-to-human and M2M traffic Future Internet Security 37
  • 32. high-speed wireless vs. M2M  high-speed systems built from information-theoretic principles with small control info and large data  M2M requires short data packets from massive number of devices each transmitting sporadically Future Internet Security 40
  • 33. The issue of short packets  Today’s cellular systems are designed mainly for broadband traffic sources  Can easily accommodate 5 clients transmitting at 2 Mbit/s each, but not 10.000 clients transmitting at 1kbit/s  Coding and control overhead may become predominant  Preambles for channel estimation may be longer than data payload! Future Internet Security 41
  • 34. wireless M2M  some challenges:  highly reliable connections despite coverage problems  low latency  long battery lifetime  massive number of nodes with sporadic use  some opportunities:  correlation of machine-type data across space and time  predictability and/or periodicity of data/control traffic  header compression using implicit/context information  advanced PHY/MAC techniques Future Internet Security 42
  • 35. Densification and diversification Next generation of ICT Advanced PHY Native MTD support HetNets & multi-RAN Software defined networks Cognition & machine learning Future Internet Security
  • 36. HetNets & multi-RAN  Heterogeneous networks (HetNets):  Small cell networks including macrocells and small cells of all types  Provide improved spectrum efficiency (bps/Hz/km2), capacity, and coverage  Small cells can support wireless applications for homes and enterprises as well as metropolitan and rural public spaces  Require solutions for cell selection, handover, dynamic content caching, … Future Internet Security 44
  • 37. Next generation of ICT Advanced PHY Native MTD support HetNets & multi-RAN Software defined networks Cognition & machine learning Softwarization & Cloudification Future Internet Security
  • 38. Planes of Networking (1/2)  Data Plane  All activities involving as well as resulting from data packets sent by the end user, e.g.,  Forwarding  Fragmentation and reassembly  Replication for multicasting  Control Plane  All activities that are necessary to perform data plane activities but do not involve end-user data packets  Making routing tables  Setting packet handling policies (e.g., security)  Base station beacons announcing availability of services Ref: Open Data Center Alliance Usage Model: Software Defined Networking Rev 1.0,” http://www.opendatacenteralliance.org/docs/Software_Defined_Networking_Master_Usage_Model_Rev1.0.pdfFuture Internet Security
  • 39. Data vs control planes  Data plane runs at line rate  e.g., 100 Gbps for 100 Gbps Ethernet  Fast Path  Typically implemented using special hardware  Few activities handled by CPU in switch  Slow path  e.g., Broadcast, Unknown, and Multicast (BUM) traffic  All control activities are generally handled by CPU Future Internet Security
  • 40. OpenFlow key idea  Separation of control and data planes  Centralization of control  Flow based control  Control logic is moved to a controller  Switches only have forwarding elements  One expensive controller with a lot of cheap switches  OpenFlow is the protocol to send/receive forwarding rules from controller to switches •Ref: N. McKeown, et al., ``OpenFlow: Enabling Innovation in Campus Networks," ACM SIGCOMM CCR, Vol. 38, No. 2, April 2008, pp. 69-74.Future Internet Security
  • 41. OpenFlow basics  One packet arrives to the switch  Switch logic compares header fields with flow entries in a table  if any entry matches  take indicated actions  If no header match   packet is queued and header is sent to the controller  Controller sends a new rule to the switch  subsequent packets of the flow are handled by this rule  Doesn’t all of this sound somehow familiar? Ref: N. McKeown, et al., ``OpenFlow: Enabling Innovation in Campus Networks," ACM SIGCOMM CCR, Vol. 38, No. 2, April 2008, pp. 69-74.Future Internet Security
  • 42. What do we need SDN for? ① Virtualization: Use network resource without worrying about where it is physically located, how much it is, how it is organized, etc. ② Orchestration: Manage thousands of devices ③ Programmable: Should be able to change behavior on the fly ④ Dynamic Scaling: Should be able to change size, quantity ⑤ Automation: Lower OpEx ⑥ Visibility: Monitor resources, connectivity ⑦ Performance: Optimize network device utilization ⑧ Multi-tenancy: Sharing expensive infrastructure ⑨ Service Integration ⑩ Openness: Full choice of Modular plug-ins ⑪ Unified management of computing, networking, and storage http://www.cse.wustl.edu/~jain/tutorials/icc14.htmFuture Internet Security
  • 43. 5G is changing ‘the Equation’ The issue of 5G is not only more capacity but also more reactive, smart and connected devices
  • 44. 5G is changing ‘the Equation’ “Latency” is based on 3 major component: transmission delay + routing and switching + IT response time Wireless / Wired Processing and Storage Future Internet Security
  • 45. Local processing to reduce the latency: the ECM Future Internet Security
  • 47. Machine Learning Next generation of ICT Advanced PHY Native MTD support HetNets & multi-RAN Software defined networks Cognition & machine learning Future Internet Security
  • 49. True for human, true for networks  Sense: nowadays devices are crammed with transducers/sensing apparatuses needs efficient data handling  Learn: optimization algorithms can be run at each node individually needs (i) efficient algos (ii) harmonization  Act: network modifies the environment requires convergence of multiple devices Future Internet Security
  • 50. Cognition-based Network Each node of the network:  exploits local information to achieve its goal  shares it with its neighbors Self-adaptation to the environment to achieve network wide goals Cognition applied to the entire network Future Internet Security
  • 52. Analysis  We consider a test set of 38 video clips, all encoded in an H.264-AVC format  All the videos are encoded with a 16-frame structure (1 I-frame, 15 P-frames) and compressed with 18 different rates  Depending on the content, the perceived quality of a compressed version changes We used the SSIM indicator to capture it Future Internet Security
  • 53. SSIM versus rate SelfSimilarityIndex(SSIM) r=log(actual rate/original rate)Future Internet Security
  • 54. Requirements for video delivery  QoE-based and content-aware resource allocation  Rate-distortion curve depends on video content  Video content affects size of the encoded video frames  RBM can be used to infer rate-distortion curve of a video by observing the size (not the content) of video frames Future Internet Security
  • 55. “Our” Video Classes Future Internet Security
  • 56. QoE-aware proxy vs legacy video clients Future Internet Security
  • 57. WHAT’S ABOUT 5G SECURITY? Winter is coming… Future Internet Security
  • 58. Cloudification/Softwarizatio n  Cloudification  In legacy networks, security of function network elements relies largely on physical protection  In 5G, virtual network elements will run on cloud- based infrastructure  5G infrastructure security must be taken into consideration!  Softwarization  SDN improves flexibility, but introduces single point- of-failure issues  Network slicing isolates applications to provide better service differentiation. Source traffic policing becomes an issue Future Internet Security
  • 59. Heterogeneous access  Multi-RAT but also multi-network  Issue: building security architecture suitable for different access technologies  IoT devices represent a security threat  many ways to access networks (directly, via a gateway, or through a multi-hop mesh)  need to develop security trans-technology mechanisms  security management must be efficient and lightweight Future Internet Security
  • 60. Low-Delay Mobility Security  Vehicles network, remote surgery,… require high reliability with a delay < 1 ms, also in mobility  Need for fast security algos and mobility security may be redesigned & optimized for 5G Future Internet Security
  • 61. Pervasivity & privacy  IoT is gonna spread basically everywhere, and it is already in most of our houses  Smartphones, google/amazon assistants, smart lighting, surveillance systems, roomba…  a great amount of user privacy information will be carried over the 5G network  any information leak may lead to severe consequences Future Internet Security
  • 62. Technologies & privacy  mmWaves, beamtracking, RF tomografy, … a lot of private information can be obtain from (or wormed out of) radio signals analysis Future Internet Security
  • 63. Technology frailties  mmWave: can provide ultra-fast directional links, but it is easy to block  Reflecting surfaces may help improve coverage or confuse tracking/beamforming algos  ML can be used to solve very complex problems, but their black-box nature raises questions about their trustability Future Internet Security CVPR 2018 Robust Physical-World Attacks on Deep Learning Visual Classification
  • 64. Conclusions  Today IT and telco are converging  Telcos are requested to support a large and rapidly expanding set of applications/services  Telco need to define new models to valorize their infrastructure  The new trend: telcos are becoming more cloud platforms than just a communication system  Trillions of devices are expected to be connected in the next years Future Internet Security
  • 65. Conclusions  This revolution will bring along a wealth of new applications and technologies that will open new business cases, application scenarios, research opportunities…  but… we all have to bear in mind one important thing… Future Internet Security
  • 66. Future Internet SecurityGame of Thrones Night King mural by Jonas Never at Brennan's | Photo: @never1959, Instagram
  • 67. The author wishes to thank Dr. Emilio Calvanese Strinati of CEA-LETI for contributing a few slides and ideas to this presentation Acknowledgments