This document discusses the use of Ethernet in optical fronthaul networks to support the deployment of white-box solutions in telecom network transformation. It covers digital radio over fiber (D-ROF) techniques like CPRI, OBSAI, and ORI that allow separating the baseband and radio units. The IEEE P1914.3 standard for radio over Ethernet is described, which enables transporting digitized radio signals over Ethernet. This paves the way for implementing white-box switches that support radio over Ethernet, providing cost savings and flexibility to mobile network operators.
A Novel Resource Allocation Method For Multicasting Network Using Call Admiss...IJTET Journal
Abstract— WiMAX relay networks make resource allocation decisions once per frame. An IEEE 802.16j frame consists of a downlink sub frame and an uplink sub frame. This study focuses on the downlink multicast problems. The downlink sub frame can be divided into an access zone and a relay zone. In the access zone, the BS transmits the video data to its served RSs and SSs. In the relay zone, the RSs further relay the video data to their served SSs. To determine the data transmissions within each frame, the BS should make a scheduling decision at the beginning of each frame using an appropriate resource allocation scheme. WiMAX is generally used to reduce the delays and packet loss. It a wireless standard designed to provide data transfer. In this paper mainly focuses on implementing BGWA based algorithm in order to avoid unwanted intrusion occurrences in handoff time. The Mobile Motion Prediction algorithm generally keeps track of the positions of the mobile stations and their relevant connections. The task of motion prediction is to track the motion of the mobile station in different gateways. Then different prediction methods are applied according to the sensitivity of the range to gain high precision. CAC Approach can be used to the worldwide interoperability for microwave access (WiMAX) is a promising technology for last-mile Internet access, particularly in the areas where wired infrastructures are not available. Mainly this approach is used to transmitting the video/Audio sending from base station to relay station with transmitting or secretes code.
Fiber optics in-buildings infrastructure paper - OEA- LebanonKSU
This review paper discusses the benefits of fibre broadband and considerations for real estate developers in Lebanon; it compares different FTTx network architectures, the standardization of building network elements, the need for local legislations and describes typical FTTH deployments worldwide.
A presentation on Cloud RAN fronthaul, current deployment Options, benefits and challenges. This was presented in the
iJOIN Winter School "5G Cloud Technologies: Benefits and Challenges", Bremen, 2015-02-23
A Novel Resource Allocation Method For Multicasting Network Using Call Admiss...IJTET Journal
Abstract— WiMAX relay networks make resource allocation decisions once per frame. An IEEE 802.16j frame consists of a downlink sub frame and an uplink sub frame. This study focuses on the downlink multicast problems. The downlink sub frame can be divided into an access zone and a relay zone. In the access zone, the BS transmits the video data to its served RSs and SSs. In the relay zone, the RSs further relay the video data to their served SSs. To determine the data transmissions within each frame, the BS should make a scheduling decision at the beginning of each frame using an appropriate resource allocation scheme. WiMAX is generally used to reduce the delays and packet loss. It a wireless standard designed to provide data transfer. In this paper mainly focuses on implementing BGWA based algorithm in order to avoid unwanted intrusion occurrences in handoff time. The Mobile Motion Prediction algorithm generally keeps track of the positions of the mobile stations and their relevant connections. The task of motion prediction is to track the motion of the mobile station in different gateways. Then different prediction methods are applied according to the sensitivity of the range to gain high precision. CAC Approach can be used to the worldwide interoperability for microwave access (WiMAX) is a promising technology for last-mile Internet access, particularly in the areas where wired infrastructures are not available. Mainly this approach is used to transmitting the video/Audio sending from base station to relay station with transmitting or secretes code.
Fiber optics in-buildings infrastructure paper - OEA- LebanonKSU
This review paper discusses the benefits of fibre broadband and considerations for real estate developers in Lebanon; it compares different FTTx network architectures, the standardization of building network elements, the need for local legislations and describes typical FTTH deployments worldwide.
A presentation on Cloud RAN fronthaul, current deployment Options, benefits and challenges. This was presented in the
iJOIN Winter School "5G Cloud Technologies: Benefits and Challenges", Bremen, 2015-02-23
Qualcomm is elevating its role as a market leader by bringing breakthrough concepts to LTE’s evolution. We believe that the next significant performance leap will come from heterogeneous networks, or HetNets, which bring the network closer to the user through low-power nodes such as pico and femto-cells. LTE Advanced uses adaptive interference management techniques to further improve the capacity and coverage of these HetNets. There by, ensuring fairness among users and an enhanced mobile experience, especially for those users at the cell edge. LTE Advanced also introduces multicarrier to leverage ultra wide bandwidths up to 100 MHz, supporting very high data rates.
4G World Mobile Backhaul Summit. If you missed it in person, feel free to view it online.
Speakers:
Mark Casey, CFN Services, Incorporated
Mike Dodson, Utopian Wireless
Doug Smith, Digital Bridge
Dan Graf, Leap Wireless/Cricket Communications
If you have any questions please contact CFN Services at backhaul@cfnservices.com
Qualcomm is elevating its role as a market leader by bringing breakthrough concepts to LTE’s evolution. We believe that the next significant performance leap will come from heterogeneous networks, or HetNets, which bring the network closer to the user through low-power nodes such as pico and femto-cells. LTE Advanced uses adaptive interference management techniques to further improve the capacity and coverage of these HetNets. There by, ensuring fairness among users and an enhanced mobile experience, especially for those users at the cell edge. LTE Advanced also introduces multicarrier to leverage ultra wide bandwidths up to 100 MHz, supporting very high data rates.
4G World Mobile Backhaul Summit. If you missed it in person, feel free to view it online.
Speakers:
Mark Casey, CFN Services, Incorporated
Mike Dodson, Utopian Wireless
Doug Smith, Digital Bridge
Dan Graf, Leap Wireless/Cricket Communications
If you have any questions please contact CFN Services at backhaul@cfnservices.com
Enabling 5G X-Haul with Deterministic Ethernet - A TransPacket whitepaperIvar Søvold
Transpacket (www.transpacket.com) explores the concept of Ethernet X-Haul in a newly released whitepaper. Discussed extensively in the mobile industry in connection with 5G, the idea is to have an Ethernet based converged transport network serving multiple purposes including fronthaul and backhaul. The whitepaper presents the RAN architectures under consideration for 5G, and their consequences in terms of requirements for the transport network. It further describes how an innovative Ethernet scheduling mechanism is required to support deterministic Ethernet, and to fully achieve an 5G Ethernet X-Haul. It also introduces two use cases, namely Ethernet Crosshaul, and Indoor Coverage, which demonstrate the added value of deterministic Ethernet for mobile transport applications.
White Paper: Evolving Technolgies for Mobile Front and BackhaulingSusmita Adhikari Joshi
While fibers are mostly being deployed in the backhaul networks, a new approach of building flexible mobile networks is being pushed forward where fiber is also used from the base station to the antenna, which is called fronthaul.
Throughput Performance Analysis VOIP over LTEiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Reprinted with permission of NCTA, from the 2014 Cable Connection Spring Technical Forum Conference Proceedings. For more information on Cisco solutions, visit: http://www.cisco.com/c/en/us/solutions/index.html
Long term evolution (LTE) is replacing the 3G services slowly but steadily and become a preferred choice
for data for human to human (H2H) services and now it is becoming preferred choice for voice also. In
some developed countries the traditional 2G services gradually decommissioned from the service and
getting replaced with LTE for all H2H services. LTE provided high downlink and uplink bandwidth
capacity and is one of the technology like mobile ad hoc network (MANET) and vehicular ad hoc network
(VANET) being used as the backbone communication infrastructure for vehicle networking applications.
When Compared to VANET and MANET, LTE provides wide area of coverage and excellent infrastructure
facilities for vehicle networking. This helps in transmitting the vehicle information to the operator and
downloading certain information into the vehicle nodes (VNs) from the operators server. As per the ETSI
publications the number of machine to machine communication (MTC) devices are expected to touch 50
billion by 2020 and this will surpass H2H communication. With growing congestion in the LTE network,
accessing the network for any request from VN especially during peak hour is a big challenge because of
the congestion in random access channel (RACH). In this paper we will analyse this RACH congestion
problem with the data from the live network. Lot of algorithms are proposed for resolving the RACH
congestion on the basis of simulation results so we would like to present some practical data from the live
network to this issue to understand the extent RACH congestion issue in the real time scenario.
Cloud Radio Access Network (C-RAN) has emerged as a promising solution to meet the ever-growing capacity demand and reduce the cost of mobile network components. In such network, the mobile operator’s Remote Radio Head (RRH) and Base Band Unit (BBU) are often separated and the connection between them has very tight timing and latency requirements. To employ packet-based network for C-RAN fronthaul, the carried fronthaul traffic are needed to achieve the requirements of fronthaul streams. For this reason, the aim of this paper is focused on investigating and evaluating the feasibility of Integrated Hybrid Optical Network (IHON) networks for mobile fronthaul. TransPacket AS (www.transpacket.com) develops a fusion switching that efficiently serves both Guaranteed Service Transport (GST) traffic with absolute priority and packet switched Statistical Multiplexing (SM) best effort traffic. We verified how the leftover capacity of fusion node can be used to carry the low priority packets and how the GST traffic can have deterministic characteristics on a single wavelength by delaying it with Fixed Delay Line (FDL). For example, for L1GE SM =0.3 the added SM traffic increases the 10GE wavelength utilization up to 89% without any losses and with SM PLR=1E-03 up to 92% utilization. The simulated results and numerical analysis confirm that the PDV and PLR of GST traffic in Ethernet network meet the requirements of mobile fronthaul using CPRI. For Ethernet network, the number of nodes in the network limits the maximum separation distance between BBU and RRH (link length); for increasing the number of nodes, the link length decreases. Consequently, Radio over Ethernet (RoE) traffic should receive the priority and Quality of Service (QoS) HP can provide. On the other hand, Low Priority (LP) classes are not sensitive to QoS metrics and should be used for transporting time insensitive applications and services.
Traffic Offloading Solutions: Femto, WiFi and Integrated Femto-WiFiShristi Pradhan
I provide a comprehensive overview on various traffic offloading solutions:
1. Femtocells, which provides the benefits of scalability, automatic configuration and self-optimization.
2. WiFi, widely available in homes and hotspots.
3. Integrating femto and WiFi together to reap the benefits of both femtocell and WiFi technology.
Emerging Radio Technologies that are mmWave communications, Massive MIMO, Novel Waveforms and Multiple Access techniques etc. will provide ultra-high data rate traffic per user. However, only new Radio techniques implemented in lower layers of legacy networks could not guarantee the all 5G requirements, consequently the new network architecture along with new Radio technologies will emerge to fulfill all 5G requirements.
Similar to Wireless-fiber convergence: Ethernet at Fronthaul creating new possibilities for 5G and beyond (20)
Presentation:
Time synchronization is one of the key imperatives of communications infrastructure. Real time persistence and near real time data processing are becoming essential to serve enhanced user experience in many industries. In this presentation, Dhiman Chowdhury will present sync plane design constructs for time aware non-deterministic networks across industry verticals.
Note: This presenation was shared at Open Compute Project (OCP) Time Appliance Project (TAP).
About Dhiman:
Dhiman Deb Chowdhury manages Product Management and Strategic Marketing for Protempis (formerly Trimble’s Time and Frequency division). Prior to joining Trimble, Dhiman served as vice President of Product Marketing redefining edge networking and open networking and expanding IPI global presence. At Delta Electronics, Dhiman was instrumental to whitebox products and technology venture “Agema System''. He advocated open networking, network cloudification and whitebox solutions for different industry verticals as a thought leader. In this role, Dhiman oversaw the technology strategy and development of Agema open networking product solutions. Prior to joining Delta Electronics, Inc., Dhiman worked as Director of Technical Program (R&D) at Allied Telesis, Inc where defined and developed technology strategy, products and services for enterprise and service providers networks. In 2004, he spearheaded the development of Industry’s first residential VoIP gateway at Netgear where he started service provider product lines. Prior to this, he was a member of Nortel’s technology leadership team working as a principal architect to define protocol, product and technology. At Nortel, Dhiman participated in the development of Industry’s first hybrid VoIP Routing Systems.
Dhiman has authored several technology books and written many scholarly articles. His recent publication “Nextgen Network Synchronization” provides a comprehensive overview of sync plane design for various network infrastructure and applications across industry verticals. Subsequently, some of his technology books on Unified and high-speed internetworking are continued to be reference handbooks for undergraduate studies globally. Dhiman studied Doctor of Business Administration (DBA) at The Robert Gordon University (RGU) and MBA at University of Liverpool. Dhiman is an avid blogger on technology and a Philanthropist.
Precise time synchronization is critical for 4G and 5G networks whether it is legacy deployment, 5G OpenRAN, Cloud Native 5G or Enterprise 5G deployments utilizing midband 5G spectrum, e.g. CBRS.
The Presentation goes over different network scenarios and present precise synchronization solutions for each.
Synchronization is essential for fusion of vision and sensors from machine vision to Autonomous vehicle. For the latter, time sync must be within certain error budget. Please view this infographics for more details.
The fifth generation (5G) technologies ushering in a new era of digital transformation across industries. With the promise of extreme bandwidth ( nearly 100 times faster than 4G),
ultra-low latency, high levels of security and reliability, 5G holds the promise to transform industries in ways we’re just
beginning to comprehend. The 5G technologies will change the way we connect, consume information and work. More importantly, it brings new capabilities to businesses, enabling them to deliver ground breaking solutions that reach across societies. This whitepaper provides a brief discussion on 5G technologies and importance of precise synchronization to enable 5G technologies for business transformation.
Time is everywhere but it's implementation in #5G is not easy. Unlike #4G, #TDD is more common in 5G especially in mid-bands [ #3.5Ghz (CBRS) and #Sub6Ghz ] to higher bands (as in mmWave) spectrums and also in spectrum overlays. TDD provides #spectrum efficiency but requires precision time synchronization.
Read this article to learn more about 5G synchronization challenges and how to address it.
Interested knowing BGP convergence number for ISP Peering solutions. Learn from IPInfusion's OcNOS BGP test report.
Build your disaggregated Network using IPInfusion's OcNOS.
World's First Disaggregated 5G-Ready Mobile backhaul SolutionDhiman Chowdhury
SKY Brazil is one of the largest Pay TV provider in Brazil with 5Million+ subscribers created world’s first disaggregated 5G-ready Fixed Wireless Access (FWA) network using IPInfusion’s disaggregated PE Solution to serve 35K broadband subscribers.
This infographics provides a a glimpse of how the deployment was done.
IP Infusion Application Note for 4G LTE Fixed Wireless AccessDhiman Chowdhury
SKY Brazil is one of the largest Pay TV provider in Brazil with 5Million+ subscribers created world’s first disaggregated 5G-ready Fixed Wireless Access (FWA) network using IPInfusion’s disaggregated Cell Site Gateway Solution to serve 35K broadband subscribers.
Learn how the deployment was done, read this application note to know more about the usecase and OcNOS configurations.
There is an ominous rumbling in the internet about 768K day, some even termed it internet doomsday others called it “Y2K” of internet. The fear is justified given the experience of wide spread internet outage during 512K day when internet BGP table size exceeded 512,000 routes. The 512K day caused havoc and many routers simply exhausted of TCAM (Ternary content-addressable memory) size and were unable to process certain routes leaving parts of internet unreachable. The same issue seems possible this year again when internet routes exceeds 768K routes.
IP Infusion worked with the London Internet Exchange (LINX) to create world's first disaggregated network for transport peering. The network is essentially a extended DCN (Data Center Network) with ip routing as underlay and VxLAN as overlay. The EVPN control plane effectively managing over transport from end to end.
The fundamental architecture, configuration and protocol suits that build such network is now available in a micro pod. IP Infusion branded such extensible micro-pod as “DC-BOX” or data center network in a bundle. The DC-BOX accelerates the move to next generation data center architectures with open networking switches. This pre-configured ready-to-deploy bundle delivers carrier-grade performance with the benefits of disaggregation. This presentation depicts various use cases for the DC-BOX in telecom, data center, Internet Exchange Point, Cloud Services and service providers networks.
IPI DC-BOX, a ready-to-deploy data center in a
bundle, uses OcNOS™ carrier-grade network
operating system to build next generation data
centers with the benefits of disaggregation.
Targeted DC Architectures:
1. Leaf and Spine
2. CLOS Fabric
3. Mobile Edge Computing
4. Internet Exchange Point (IXP)
Large Scale Data center Solution Guide: eBGP based designDhiman Chowdhury
Network Automation provides IT administrators and network operators significant benefits. This solution guide
describes an approach to build data centers using Layer3 BGP routing protocol.
It also summarizes on some design philosophies for data center and why E-BGP is better suited.
■ Large-scale data center requirements
■ Large-scale data center topologies
■ Large-scale data center routing
■ EBGP-routed large-scale Clos topology-based data cente
World's First Dsiaggregated Networks for Internet Exchange Point (IXP)Dhiman Chowdhury
This infrographics summarizes deployment of whitebox powered by IPInfusion's OcNOS in the World's First Dsiaggregated Network for Internet Exchange Point (IXP). The London Internet Exchange (LINX) build this completely disaggregated network using EVPN technology from IPInfusion. This inforgraphics is prepared by Dhiman Deb Chowdhury.
Interoperability Showcase: Eantc tested IPInfusion software with 21 other ven...Dhiman Chowdhury
EANTC conducted interoperability tests for 21 vendors including ipinfusion, cisco, juniper and Ericsson etc for MPLS, segment routing and EVPN level of interoprabilities. The test shows IPInfusion's OcNOS interworking with major networking software and/or equipment vendors.
Intel and IP Infusion Deliver Deterministic NFV PerformanceDhiman Chowdhury
IP Infusion's VirNOS virtual networking solutions combines Intel performance technology with proven control plane to offer stable performance. VirNOS is also integrated with the Data Plane Development Kit (DPDK), a library of drivers for fast packet processing. DPDK is a Linux Foundation Project for which Intel is among the leading members.
The VirNOS data plane is extremely modular, featuring flexible NFV infrastructure for both control plane (NFVI-C) and for the
user plane (NFVI-U). The NFVI-U offers hardware abstraction and packet handling services, with plug-in modules for SDKs and different network cores. On top of that, IP Infusion has introduced VNFs as a Service, allowing the user to customize IP/MPLS switching and routing services as well as VxLAN and NvGRE services. For SDN environments, VirNOS also features OpenFlow switching alongside the IP capabilities via an OpenFlow Agent and connectivity to a centralized OpenFlow controller.
The Intelligent Mesh: Bringing together converging forces to enable NextGen I...Dhiman Chowdhury
As the backbone of the digital revolution, Information Communication Technology (ICT) infrastructure is evolving from disparate systems towards more integrated, efficient and intelligent solutions. This technological advent blurring the line between physical and digital world: from network systems to digital endpoint for physical interconnect, intelligent mesh is shaping the world bringing new possibilities while empowering us with great understanding of our physical world.
In this presentation, Dhiman Deb Chowdhury from Delta Electronics will discuss the end to end ICT solutions depicting trends and transformations educating audience on various infrastructures: data center, telecom and enterprise.
The presentation will be furnished in two parts: first, trends of intelligent digital interconnect will be discussed with emphasis on data center, telecom and enterprise infrastructures sharing experience of serving global customers and helping audience to realize the potential for their own ICT undertakings. Secondly, the presentation will bring together converging forces from networks to discrete endpoints sharing topologies from power distribution to network systems depicting customers the choices of systems and technologies available for their ICT infrastructure transformation. While Part one of this presentation is educational in nature, Part II will be more vendor specific which illustrates Delta’s firm commitment to drive technology in such direction assisting ICT infrastructure professionals to make the right decision and maximize business value for the long term.
Ethernet technology made significant progress in recent years ushering a new era of terabit transport. It has now achieved 400GbE per link speed and leaping towards 800GbE. Such trend will shape the future of networks allowing hyperscale data centers, cloud and service providers to offer more service and less worry on bandwidth. It would be interesting to know what future holds. Read this article to learn more about 400GbE and the possibilities it brings.
As the backbone of the digital revolution, Information Communication Technology (ICT) infrastructure is evolving from disparate systems towards more integrated, open, efficient and intelligent solutions. While this advancement is to some extent piecemeal given the limitations of various systems and lack of open community initiatives at all level, we at Delta are committed and working towards integrated, open and efficient Smart ICT infrastructure systems bringing best of the breed technologies to help customers maximize their business values.
In this presentation, Dhiman Chowdhury from Delta will discuss the end to end ICT infrastructure topologies from power distribution to network systems depicting customers the choices of systems and technologies available for their ICT infrastructure transformation. While this presentation includes forward-looking statements from vendor-specific solutions, it is also our firm commitment to drive technology in such direction and will assist ICT infrastructure professionals to make the right decision and maximize business value for the long term.
Cloud computing is increasingly becoming critical part of IT solutions. This presentation series is intended to provide guidance for the selection, integration and implementation of private cloud. In part-I, readership will learn essentials about private cloud and the presentation will serve as the prelude towards extensive learning about “private cloud” including strategy, planning/process, testing and deployment of the private cloud product.
I hope this presentation series will provide adequate information on “private cloud” empowering IT professionals and CIOs to make better and educated decisions.
Balancing continued economic progress and conservation of our biosphere is the challenge of our time. It’s a dilemma of the anthropocene epoch. Without corporation to the mix, our endeavor is fruitless. Increasingly, corporations have adopted prescriptive, piecemeal and mechanistic environmental management techniques as a response to sustainability discourse. However, in light of the complexity, uncertainty, ambiguity and dynamic nature inherent in the sustainability challenge, at some bifurcation point in the organizational change process, these prescriptive and piecemeal solutions may not adequately account for the emerging multiple levels of environmental, social and financial conflict. A paradigm shift is thus essential: a behavioral change is thus called for. This presentation provides an explanation to the issue and a formulation to tackle challenge head-on: a behavioral competence that builds viable, equitable and responsible corporation resolving issues of sustainable business and sustainable world.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
3. Contents
1.0 D-ROF (Digital Radio over Fiber) .............................................................................................................3
1.1 Common Public Radio Interface (CPRI)...............................................................................................4
1.2 Open Base Station Architecture Initiative (OBSAI) .............................................................................6
1.3 Open Radio Interface (ORI).................................................................................................................7
2.0 Radio over Ethernet (RoE).......................................................................................................................7
3.0 Ethernet at Optical Front haul Network: The case for White-box..........................................................9
4.0 Reference:...............................................................................................................................................9
4. Gothenburg is a port city nestled within the unique Kattegat (a sea area considered neither North Sea
nor the Baltic Sea, a contradiction in itself) nearly 290 miles northwest of Stockholm, capital of Sweden.
The days are gloomy here specifically in the fall season and in the winter, fortunate to have a glance of
sun if you are lucky yet the city has much to offer. Gothenburg’s panoramic beauty is certainly
something to behold. From its historic buildings to classic culinary, this largest port city of Nordic region
has something to offer for everyone. However, I am not here to indulge in her beauty rather in a quest
to learn about technological trend in optical networking and present whitebox open networking
solutions in telecom network transformation at the European Conference on Optical Communication
(ECOC 2017). I was quite amazed by noting the advances in photonic technologies, more importantly
available technologies for 200GbE to 600GbE transports and how optical networking is paving the way
for mobile networks to accommodate higher bandwidth. For mobile networks, optical networking now
starts at the cell tower and D-ROF (Digital RF over Fiber) techniques used for transport. In fact, wireless
and fiber convergence is something interesting and will shape the LTE-A, 5G transport networks, thanks
to the advances in D-ROF technologies.
1.0 D-ROF (Digital Radio over Fiber)
The D-ROF techniques allows a split architecture in which BBU (Baseband Unit) and Radio Remote Head
(RRH) can be separated contrary to traditional deployment where BS (Base Station) includes both RRU
(Radio Remote Unit) or RRH and BBU.
Figure 1. Traditional Cell tower with coaxial cabling system.
Now, RRH performing analog processing is mounted in the Cell tower due to smaller size and weight and
BBU performing baseband digital processing can be placed at the base of the tower or in a remote
location connected through fiber. D-ROF was developed around year 2000 and since then it has received
significant interest. Its counterpart A-ROF (Analog Radio over Fiber) did not get standardize due to
5. physical layer impairment over long distance (Haddad & Gagnaire, 2014). Radio signals are digitized at
RRH and then transmitted over fiber to BBU according to one of the protocol mechanisms listed below:
• CPRI (Common Public Radio Interface)
• OBSAI (Open Base Station Architecture Initiative)
• ORI (Open Radio Interface)
D-ROF creates a potential for high bandwidth support as needed for 5G despite some of the challenges
in standardization and connecting multi-vendor BBUs. Overall, it offers the promise of CAPEX and OPEX
reduction.
1.1 Common Public Radio Interface (CPRI)
The CPRI is an important element of mobile fronthaul networks. It connects RRH (Radio Remote Head)
and BBUs with fiber instead of traditional copper or coaxial cable. As of today, traditional co-axial based
cell towers are undergoing complete overhaul from bulky, expensive and power hungry cabling system
to fiber optic cabling for longer-reach distances and more capacity.
The CPRI initiative started in November, 2003 as a cooperation between five companies: Ericsson,
Huawei, NEC, Nortel Networks and Siemen’s mobile (CPRI, 2015). As of writing this article, only four
organization currently involved in this evolving specification: Ericsson, Huawei, NEC and Nokia (CPRI,
2015). The specification only defines the key criteria for interfacing transport, connectivity and control
communications between the BBU and RRU. It is one of the protocols for D-ROF (Frigerio, Lometti &
Sestito, 2017) and considered more efficient than OBSAI and ORI (Haddad & Gagnaire, 2014).
Figure 2. Common Public Radio Interface.
CPRI defines layer 1 and 2 protocols for user, control, synchronization and management. Layer 1 is
related to Time division multiplexing of data flows, low level signaling and electrical and optical
6. characteristics while layer 2 is about MAC (Media Access Control), Flow control and data protection of
the control/management flow. The protocol interface supports upto 24Gbps transfer rate and round
Trip Delay is limited to 5 µS (Tornatore, Chang & Ellinas, 2017). Additionally, Two different layer 2
protocols are supported in CRPI: a subset of HDLC & Ethernet.
User Plane
Control & Management
Plane
Sync
I/Q Data
Vendor
Specific
Ethernet HDLC
L1
inband
protocol
Time Division Multiplexing
Electrical Transmission Optical Transmission
Figure 3. Overview of CPRI protocol.
The eCPRI specification 1.0 claims it suitability for 5G mobile transmission and intended for packet based
fronthaul transport network like Ethernet and IP. The following diagrammatical representation depicts
eCRPI protocol stack over IP/Ethernet Networks.
User
Data
Connection
OAM
C
&
M
UDP
eCPRI Protocol Layer
Synchro-
nization
IP
IPSEC
Ethernet PHY
Ethernet OAM
Ethernet MAC [ VLAN Priority Tag/MAC Sec]
ICMP
Real-
Time
Control
Other
Services
SyncEPTP
SN
MP
UDP,
TCP,
SCTP
UDP
Figure 4. eCPRI Protcol stack overview (eCRPI, 2017).
7. The eCPRI is compatible to point-to-point and Point to multi-point legacy CRPI as well multipoint to
multipoint transport. More importantly, eCPRI enables the possibility of extending IP based Ethernet
transport network to fronthaul at the Cell tower.
1.2 Open Base Station Architecture Initiative (OBSAI)
Unlike CPRI, OBSAI is an initiative for open base station but also defines interface between RRH and
baseband unit. The OBSAI forum started by Hyundai, LG Electronics, Nokia, Samsung Electronics and ZTE
Corporation in 2002. Its goal is to create an open market for cellular base stations (BTS). There are four
components to OBSAI architecture: RRH block, Base Band block, Control & Clock block and transport
block.
Control & Clock Block
RP1
Figure 5. OBSAI Architecture depicting four blocks and interfaces.
The RP3-01 interface is similar to CPRI and supports bit rates from 768 Mbps to 6.1Gbps. Both CPRI and
8. OBSAI now supports Ethernet transport at RRH level. For example, Intel’s Altera® FPGA OBSAI reference
architecture supports Ethernet communication interface at RP3-01 (Altera, 2011).
1.3 Open Radio Interface (ORI)
Although both CPRI and OBSAI attempted to created open industry standard for D-ROF including
support for Ethernet communication interface, both are still considered “semi proprietary” in nature.
This led to creation of ORI standard by ETSI (European Telecommunication Standard Institute) in2010 to
provide more flexibility and choice of BBU and RRH suppliers. The ORI standard is the result of
requirements work undertaken by NGMN (Next-Generation Mobile Network) alliance.
User Plane
Control & Management
Plane
Sync
I/Q Data
Vendor
Specific
Ethernet HDLC
L1
inband
protocol
Time Division Multiplexing
Electrical Transmission Optical Transmission
Scope of ORI by ETSI
Figure 6. Open Radio Interface (ORI) standards that essential augments some parts of CPRI reference architecture.
The ORI standards actually augments some parts of CPRI reference architecture as shown in figure 6
(Tornatore, Chang & Ellinas, 2017).
2.0 Radio over Ethernet (RoE)
Parallel to the work of CPRI, OBSAI and ORI to support Ethernet, IEEE initiated P1914.3 project to
standardize Radio over Ethernet (RoE) encapsulation and mapping capabilities for the front haul
transport between RRH and BBU and applicable to RF interfaces like CPRI, OBSAI and ORI. The standard
specifies: a) encapsulation of digitized I/Q (In-phase Quadrature) payload, vendor specific and control
data/flow into Ethernet payload, b) header frame format both structure-aware and structure-agnostic
encapsulation of existing digitized radio transport formats, and c) A structure-aware mapper for
Common Public Radio Interface (CPRI) frames and payloads to/from Ethernet encapsulated frames
(IEEE, n.b.). Though IEEE P1914.3 standard is yet to be ratified, it creates possibility for wider adoption
9. due to strong industry support of IEEE standards for Ethernet. The typical packet format for RoE is
shown in figure below; Ethernet frame format remain unchanged.
Preamable SFD DA SA Ethtype Payload FCS IPG
RoE EthType
subType flowID length Orderinginfo RoE Payload
RoE Header
Figure 7. Proposed RoE Packet Format (IEEEP1914.3, 2017).
According to IEEE P1914.3 draft, various Ethernet based topologies will be supported at CPRI which
includes point-to-point, point-multi-point, multipoint-to-point, ring, tree and chain. Timing
synchronization is possible through protocol such as IEEE1588 (ptp).
Figure 8. IEEE P1914.3 implementation for C-RAN.
Interestingly, RoE allows encryption and decryption of links and flows. However, technique for this
implementation is not specified in the standard.
10. 3.0 Ethernet at Optical Front haul Network: The case for White-box
The advances in D-ROF technologies such CPRI, OBSAI and ORI in separating RRH and BBU to be
deployed over long distance is essentially creating possibilities for mobile operators to be benefits from
CAPEX and OPEX reduction. More importantly, IEEE P1914.3 standard will make it easier for industry
wide acceptance of fronthaul Ethernet network. As such, it is expected that with support from merchant
silicons white-box suppliers will support implementation of RoE in their switches. Moreover, some of the
whiteboxes, e.g. Agema’s AGC7648A already offers SyncE and 1588 support with advance buffering
technique that will be ideal in such deployment. In addition to significant cost savings offered by white-
box, this disaggregation model would pave the way for further development in multi-tenant services at
cell tower level. Similarly, the deployment will also benefit telecom infrastructure to support higher
bandwidth capabilities for 5G and improve service offerings.
4.0 Reference:
Altera, 2011. OBSAI Reference Design Datasheet. Available at
https://www.altera.com/en_US/pdfs/literature/ds/ds01026.pdf .
CPRI, 2015. CPRI Overview: Input requirement for CPRI. Available online at
http://www.ieee802.org/1/files/public/docs2015/liaison-CPRI_Tdoc_1124_presentation-0315.pdf .
eCPRI, 2017. eCRPI Specification V1.0. Ericsson AB, Huawei Technologies, NEC Corporation and Nokia.
Available online at http://www.cpri.info/spec.html .
Frigerio, S., Lometti, A. & Sestito, V., 2017. Overview of Standardization for D-RoF. In Fiber-Wireless
Convergence in Next-Generation Communication Networks pp 127-156. Springer.
Haddad, A. & Gagnaire, M., 2014. Radio over Fiber (ROF) for mobile backhauling: A technical and
economic comparison between Analog and Digitized ROF. ONDM, 2014. Stockholm, Sweden.
IEEEP1914.3, 2017. IEEE P1914.3™/D2.0: Draft Standard for Radio over Ethernet Encapsulations and
Mappings. Institute of Electrical and Electronics Engineers, Inc.
Tornatore, M., Chang, G., & Ellinas, G., 2017. Fiber-Wireless convergence in Next-Generation
Communication Networks. Springer.