Slides from Muriel Medard's Keynote at IEEE Global Conference on Signal and Information Processing, 27 November 2018, Disneyland Hotel, Anaheim, California
This document contains 95 questions related to wireless networks and mobile communication systems. The questions cover topics such as infrared technology, spread spectrum techniques, IEEE 802.11, HIPERLAN, WiMax, mobile IP, routing protocols, UTRAN architecture, 3G UMTS network architecture, internetworking between WLAN and 3G networks, 4G features and challenges, orthogonal frequency division multiplexing, smart antenna techniques, LTE architecture, IMS architecture, and MVNO. The questions are divided into three parts - multiple choice questions, descriptive questions requiring short answers, and detailed descriptive questions requiring longer answers.
A detailed look at what is meant by private networks, why do we need them and why the sudden interest in them. Also discussed is the 3GPP defined 5G Non-Public Networks (NPN), they architecture, implementation, pros and cons. In addition RAN sharing and Campus Networks are also discussed with regards to where they fit in the private networks.
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
The document provides an overview of LTE physical layer specifications including OFDMA frame structure, resource block structure, protocol architecture, physical channel structure and procedures, UE measurements like RSRP and RSRQ, and key enabling technologies of LTE such as OFDM, SC-FDMA, and MIMO. It describes the LTE requirements for high peak data rates, low latency, support for high mobility users, and enhanced broadcast services.
This document contains a 20 question quiz about wireless networks and 4G LTE. It covers topics like average upload/download speeds of 4G LTE networks, how 4G LTE compares to 3G, characteristics of 4G, acronyms related to wireless networks, expected data rates of 4G, and applications that use Bluetooth. It also contains a 20 question quiz on wireless local area networks, characteristics of HSDPA, features of cellular networks, standards related to 3G networks, and applications of 3G mobile networks.
5G technology provides improved connectivity, coverage, speed and capacity compared to 4G. However, it also faces new security challenges like eavesdropping, jamming, denial of service attacks. 5G introduces several technologies and architecture to enhance security, including software-defined networking, heterogeneous networks, device-to-device communication, and massive MIMO. It also defines security domains and functions within the 5G core to authenticate users and protect network domains and user data.
This document provides an agenda for a seminar on 5G physical layer technologies. It introduces 5G and compares it to 3G and 4G. It discusses OFDMA, MIMO, waveforms, numerology and frame structure, initial access and beam management, and bandwidth parts. The introduction gives an overview of 5G requirements and the OSI reference model. Later sections provide more details on these topics and their significance for 5G.
5G SA security: a comprehensive overview of threats, vulnerabilities and rem...PositiveTechnologies
Â
This document discusses security threats and vulnerabilities in 5G standalone networks. It begins by introducing the speakers and providing background on Positive Technologies' experience in telecommunications security. It then outlines various attack vectors such as man-in-the-middle attacks and denial-of-service attacks on the 5G standalone core. The document explains that protocols like PFCP are similarly vulnerable to attacks as previous protocols like GTP. It argues that network operators should focus on prevention to avoid costly security failures. Finally, it discusses the challenges network operators face and how Positive Technologies can help through automated security products and expert services.
How will sidelink bring a new level of 5G versatility.pdfQualcomm Research
Â
Today, the 5G system mainly operates on a network-to-device communication model, exemplified by enhanced mobile broadband use cases where all data transmissions are between the network (i.e., base station) and devices (e.g., smartphone). However, to fully deliver on the original 5G vision of supporting diverse devices, services, and deployment scenarios, we need to expand the 5G topology further to reach new levels of performance and efficiency.
That is why sidelink communication was introduced in 3GPP standards, designed to facilitate direct communication between devices, independent of connectivity via the cellular infrastructure. Beyond automotive communication, it also benefits many other 5G use cases such as IoT, mobile broadband, and public safety.
This document contains 95 questions related to wireless networks and mobile communication systems. The questions cover topics such as infrared technology, spread spectrum techniques, IEEE 802.11, HIPERLAN, WiMax, mobile IP, routing protocols, UTRAN architecture, 3G UMTS network architecture, internetworking between WLAN and 3G networks, 4G features and challenges, orthogonal frequency division multiplexing, smart antenna techniques, LTE architecture, IMS architecture, and MVNO. The questions are divided into three parts - multiple choice questions, descriptive questions requiring short answers, and detailed descriptive questions requiring longer answers.
A detailed look at what is meant by private networks, why do we need them and why the sudden interest in them. Also discussed is the 3GPP defined 5G Non-Public Networks (NPN), they architecture, implementation, pros and cons. In addition RAN sharing and Campus Networks are also discussed with regards to where they fit in the private networks.
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
The document provides an overview of LTE physical layer specifications including OFDMA frame structure, resource block structure, protocol architecture, physical channel structure and procedures, UE measurements like RSRP and RSRQ, and key enabling technologies of LTE such as OFDM, SC-FDMA, and MIMO. It describes the LTE requirements for high peak data rates, low latency, support for high mobility users, and enhanced broadcast services.
This document contains a 20 question quiz about wireless networks and 4G LTE. It covers topics like average upload/download speeds of 4G LTE networks, how 4G LTE compares to 3G, characteristics of 4G, acronyms related to wireless networks, expected data rates of 4G, and applications that use Bluetooth. It also contains a 20 question quiz on wireless local area networks, characteristics of HSDPA, features of cellular networks, standards related to 3G networks, and applications of 3G mobile networks.
5G technology provides improved connectivity, coverage, speed and capacity compared to 4G. However, it also faces new security challenges like eavesdropping, jamming, denial of service attacks. 5G introduces several technologies and architecture to enhance security, including software-defined networking, heterogeneous networks, device-to-device communication, and massive MIMO. It also defines security domains and functions within the 5G core to authenticate users and protect network domains and user data.
This document provides an agenda for a seminar on 5G physical layer technologies. It introduces 5G and compares it to 3G and 4G. It discusses OFDMA, MIMO, waveforms, numerology and frame structure, initial access and beam management, and bandwidth parts. The introduction gives an overview of 5G requirements and the OSI reference model. Later sections provide more details on these topics and their significance for 5G.
5G SA security: a comprehensive overview of threats, vulnerabilities and rem...PositiveTechnologies
Â
This document discusses security threats and vulnerabilities in 5G standalone networks. It begins by introducing the speakers and providing background on Positive Technologies' experience in telecommunications security. It then outlines various attack vectors such as man-in-the-middle attacks and denial-of-service attacks on the 5G standalone core. The document explains that protocols like PFCP are similarly vulnerable to attacks as previous protocols like GTP. It argues that network operators should focus on prevention to avoid costly security failures. Finally, it discusses the challenges network operators face and how Positive Technologies can help through automated security products and expert services.
How will sidelink bring a new level of 5G versatility.pdfQualcomm Research
Â
Today, the 5G system mainly operates on a network-to-device communication model, exemplified by enhanced mobile broadband use cases where all data transmissions are between the network (i.e., base station) and devices (e.g., smartphone). However, to fully deliver on the original 5G vision of supporting diverse devices, services, and deployment scenarios, we need to expand the 5G topology further to reach new levels of performance and efficiency.
That is why sidelink communication was introduced in 3GPP standards, designed to facilitate direct communication between devices, independent of connectivity via the cellular infrastructure. Beyond automotive communication, it also benefits many other 5G use cases such as IoT, mobile broadband, and public safety.
3GPP Release 17: Completing the first phase of 5G evolutionQualcomm Research
Â
The document discusses 3GPP Release 17, which brings new system capabilities and expands 5G to new devices, applications, and deployments. Some key points:
- Release 17 completes the first phase of 5G evolution. It expands 5G to new reduced capability devices, applications in new industries, and deployment models like non-terrestrial networks.
- Release 17 enhances technologies like massive MIMO, mmWave expansion, device power savings, coverage, and ultra-reliable low latency communications. It also introduces integrated access and backhaul and simple repeaters to expand 5G mmWave coverage.
- The release further scales 5G NR to support a wide range of device classes from high-end smartphones to
Get a better understanding of 5G in this "Introduction to 5G"presentation by Doug Hohulin, Nokia 4G/5G Mobile Technology, whose focus is the strategy and business development of AV, UAS, Smart City, IoT and 5G technologies. This was part of Doug's presentation at the 2017 Gigabit City Summit (GCS17)
A detailed look at 5G security by experts from wenovator, Dr. Anand R. Prasad & Hans Christian Rudolph.
This webinar covers:
(1) 5G security
(2) Private networks security and
(3) Open vRAN security
To learn more about wenovator, visit their website: https://www.wenovator.com/
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
Security Page: https://www.3g4g.co.uk/Security/
5G Page: https://www.3g4g.co.uk/5G/
Security Blog Posts: https://blog.3g4g.co.uk/search/label/Security
Free Training Videos: https://www.3g4g.co.uk/Training/
A quick look at 5G System architecture in Reference point representation and in Service Based representation and also look at the different Network Functions (NFs) within the 5G System.
The document discusses 5G new radio (NR) physical layer resources including numerology, time-domain resources, frequency-domain resources, and space-domain resources. It provides details on key 5G NR concepts such as subcarrier spacing, symbols, slots and frames. Cyclic prefix length is determined based on subcarrier spacing to maintain consistent overhead. Slot formats in 5G NR provide more flexibility with symbol level uplink/downlink switching compared to LTE.
In this deck, Greg Wahl from Advantech presents: Transforming Private 5G Networks.
Advantech Networks & Communications Group is driving innovation in next-generation network solutions with their High Performance Servers. We provide business critical hardware to the world's leading telecom and networking equipment manufacturers with both standard and customized products. Our High Performance Servers are highly configurable platforms designed to balance the best in x86 server-class processing performance with maximum I/O and offload density. The systems are cost effective, highly available and optimized to meet next generation networking and media processing needs.
âAdvantechâs Networks and Communication Group has been both an innovator and trusted enabling partner in the telecommunications and network security markets for over a decade, designing and manufacturing products for OEMs that accelerate their network platform evolution and time to market.â Said Advantech Vice President of Networks & Communications Group, Ween Niu. âIn the new IP Infrastructure era, we will be expanding our expertise in Software Defined Networking (SDN) and Network Function Virtualization (NFV), two of the essential conduits to 5G infrastructure agility making networks easier to install, secure, automate and manage in a cloud-based infrastructure.â
In addition to innovation in air interface technologies and architecture extensions, 5G will also need a new generation of network computing platforms to run the emerging software defined infrastructure, one that provides greater topology flexibility, essential to deliver on the promises of high availability, high coverage, low latency and high bandwidth connections. This will open up new parallel industry opportunities through dedicated 5G network slices reserved for specific industries dedicated to video traffic, augmented reality, IoT, connected cars etc. 5G unlocks many new doors and one of the keys to its enablement lies in the elasticity and flexibility of the underlying infrastructure.
Advantechâs corporate vision is to enable an intelligent planet. The company is a global leader in the fields of IoT intelligent systems and embedded platforms. To embrace the trends of IoT, big data, and artificial intelligence, Advantech promotes IoT hardware and software solutions with the Edge Intelligence WISE-PaaS core to assist business partners and clients in connecting their industrial chains. Advantech is also working with business partners to co-create business ecosystems that accelerate the goal of industrial intelligence."
Watch the video: https://wp.me/p3RLHQ-lPQ
* Company website: https://www.advantech.com/
* Solution page: https://www2.advantech.com/nc/newsletter/NCG/SKY/benefits.html
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
A short video & presentation looking at when 5G icon is displayed on Smartphones, especially with Non-Standalone (Option 3 / EN-DC) deployment.
All our slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
A short video & presentation looking at what is meant by Non-Terrestrial Networks or NTN as being defined by 3GPP
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
This presentation takes a look at the technology roadmap for 5G NR millimeter wave (mmWave). Including features such as integrated access and backhaul (IAB), enhancements in beam management, mobility, coverage, and more. For more information, please visit www.qualcomm.com/mmwave
A big challenge for mobile network operators in the new, ever-evolving 5G era is the signaling security of the standardized protocols used in order to exchange data. Telecommunication companies face this challenge and have to be on the verge every time there is a potential hacker attack. What is the best way to approach these striking threats and even to be ready before it occurs?
In our webinar, Positive Technologies will offer you several breakthrough strategies on how to deal with security flaws in telecom.
Our expert will show you the evolution of protocol security, share insights into the potential activities of a hacker and give useful advice about compliance with security standards.
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
Â
This document discusses transport layer protocols for mobile ad hoc networks (MANETs). It begins with an introduction to MANETs and the need for new network architectures and protocols to support new types of networks. It then provides an overview of TCP/IP and how TCP works, including congestion control mechanisms. The document discusses challenges for TCP over wireless networks, where packet losses are often due to errors rather than congestion. It covers different versions of TCP and their approaches to congestion control. The goal is to design transport layer protocols that can address the unreliable links and frequent topology changes in MANETs.
The 5G architecture uses an entirely IP-based model to integrate various radio access technologies and provide quality service through cognitive radio technology. It converges different networks on a 5G MasterCore that can efficiently operate in parallel modes to control all networks and enable new combined services globally through an innovative World Combination Service Mode.
The document provides an introduction to 5G architecture and use cases. It discusses how 5G aims to support services with diverse requirements through enhanced mobile broadband, massive machine type communication, and ultra-reliable low latency communication. 5G will have several deployment scenarios including non-standalone using LTE infrastructure initially, and standalone 5G networks. The core network is expected to see the most radical innovation since 2G, moving to a cloud-native architecture with network slicing, separation of control and user plane, and network functions that can be deployed flexibly. The smart grid is presented as a challenging use case that may benefit from 5G capabilities such as low latency and connectivity of millions of devices.
Millimeter wave technology uses high-frequency signals between 25GHz and 300GHz to enable 5G networks to provide faster wireless connectivity. It allows for higher bandwidth and data transfer rates up to 100 times faster than current 4G networks. While millimeter wave technology provides significant advantages like high speeds and large bandwidth, it also faces disadvantages such as poor penetration and interference from rain or oxygen. 5G networks using millimeter wave technology have the potential to deliver multi-Gbps wireless connectivity and fulfill the demands of "4A" wireless services - available at any time, anywhere, with an affordable cost and at any rate.
Digital transformation is at a critical juncture, with a diverse range of industries making changes that signifi-
cantly transform the way people live and work. These shifts have been driving advancements in the financial,
transportation, manufacturing, governmental, and many more sectors. Innovative mobile broadband technologies,
an underlying infrastructure, are a key driving force behind the digitalization of all walks of life. With
the rapid development of 5G, an increasing number of new applications and business models will reshape
the social and economic formation.
Such changes will stimulate strategic planning regarding industry opportunities, technical evolution,
network architecture, and other areas. Telecom operators are growing increasingly concerned with the
creation of a new target network to maximize return on investment (ROI) and achieve business success while
maintaining a competitive edge for the future. Global operators are promoting early deployment of 5G and
innovative business models through continuous 4G evolution. This has led to today's business achievements
and has laid a solid foundation for the huge potential of 5G.
With a gradual consensus being formed for the entire industry, all related players in the industry chain will
develop close collaboration to embrace a brighter future for the wireless network industry.
Continuous 4G evolution, a road to 5G!
Making 5G New Radio a Reality - by QualcommAydin Karaer
Â
Qualcomm is developing 5G NR technology to enable a unified 5G air interface that can address diverse spectrum types, services, and deployments. 5G will transform industries and society by connecting billions of devices and delivering new immersive experiences with requirements such as ultra-low latency and ultra-high reliability. Qualcomm is leading innovations for 5G NR such as advanced channel coding, massive MIMO, and mobilizing mmWave to achieve the speed, capacity, and low latency goals of 5G over the next decade.
The document provides an overview of the Generic Framing Procedure (GFP) networking standard. It describes GFP's frame format and two modes: framed and transparent. Framed GFP maps each client frame into a GFP frame, while transparent GFP allows mapping multiple client data streams. Applications discussed include packet routing over SONET/SDH links using GFP, resilient packet rings using a ring header, and extending LANs/SANs over WANs using transparent encapsulation.
Part 10: 5G Use cases - 5G for Absolute Beginners3G4G
Â
This document discusses 5G use cases. It describes augmented reality, virtual reality, and mixed reality experiences that 5G will enable. Specific use cases mentioned include AR games, monitoring and surveillance, fixed wireless access for indoor internet, connected cars for infotainment, and connected stadiums. Additional use cases discussed are private and industrial networks, cellular vehicle-to-everything communications, and autonomous driving through 5G-enabled truck platooning. The document concludes with a table summarizing 5G's enhanced mobile broadband, massive machine-type communications, and ultra-reliable low latency capabilities and the applications they will support.
5G & Edge: High Performance with Zero-Trust SecurityRebekah Rodriguez
Â
5G and edge computing enable new enterprise use cases by providing faster internet speeds, lower latency, and the ability to connect more devices. However, fully realizing the benefits of 5G presents challenges related to regulations, integration of telecom and IT systems, evolving specifications, and security risks from a larger attack surface and network complexity. A zero trust security model that verifies all connections and limits access based on need can help address these risks. Edge computing deployments close to devices and data sources are also needed to achieve the low latency promised by 5G.
The document discusses Cloud RAN and its evolution to 5G networks. It covers key aspects of Cloud RAN including disruptive challenges like increasing bits per second per hertz, network virtualization, low latency requirements, and open interfaces. It also provides an overview of Cloud RAN architecture and how Mavenir's solutions align with an evolution from 4G to 5G networks through cloudification of the RAN.
1. Serial0 is up but the line protocol is down, indicating a potential issue with the cable or configuration settings not matching on both ends.
2. Static IP addresses are manually assigned while dynamic IP addresses are assigned by a DHCP server from its IP range, and have a lease duration after which the address may change.
3. Protocols establish rules and standards for moving data across a network, such as routing protocols like RIP, IGRP, and EIGRP that determine the best path between networks.
3GPP Release 17: Completing the first phase of 5G evolutionQualcomm Research
Â
The document discusses 3GPP Release 17, which brings new system capabilities and expands 5G to new devices, applications, and deployments. Some key points:
- Release 17 completes the first phase of 5G evolution. It expands 5G to new reduced capability devices, applications in new industries, and deployment models like non-terrestrial networks.
- Release 17 enhances technologies like massive MIMO, mmWave expansion, device power savings, coverage, and ultra-reliable low latency communications. It also introduces integrated access and backhaul and simple repeaters to expand 5G mmWave coverage.
- The release further scales 5G NR to support a wide range of device classes from high-end smartphones to
Get a better understanding of 5G in this "Introduction to 5G"presentation by Doug Hohulin, Nokia 4G/5G Mobile Technology, whose focus is the strategy and business development of AV, UAS, Smart City, IoT and 5G technologies. This was part of Doug's presentation at the 2017 Gigabit City Summit (GCS17)
A detailed look at 5G security by experts from wenovator, Dr. Anand R. Prasad & Hans Christian Rudolph.
This webinar covers:
(1) 5G security
(2) Private networks security and
(3) Open vRAN security
To learn more about wenovator, visit their website: https://www.wenovator.com/
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
Security Page: https://www.3g4g.co.uk/Security/
5G Page: https://www.3g4g.co.uk/5G/
Security Blog Posts: https://blog.3g4g.co.uk/search/label/Security
Free Training Videos: https://www.3g4g.co.uk/Training/
A quick look at 5G System architecture in Reference point representation and in Service Based representation and also look at the different Network Functions (NFs) within the 5G System.
The document discusses 5G new radio (NR) physical layer resources including numerology, time-domain resources, frequency-domain resources, and space-domain resources. It provides details on key 5G NR concepts such as subcarrier spacing, symbols, slots and frames. Cyclic prefix length is determined based on subcarrier spacing to maintain consistent overhead. Slot formats in 5G NR provide more flexibility with symbol level uplink/downlink switching compared to LTE.
In this deck, Greg Wahl from Advantech presents: Transforming Private 5G Networks.
Advantech Networks & Communications Group is driving innovation in next-generation network solutions with their High Performance Servers. We provide business critical hardware to the world's leading telecom and networking equipment manufacturers with both standard and customized products. Our High Performance Servers are highly configurable platforms designed to balance the best in x86 server-class processing performance with maximum I/O and offload density. The systems are cost effective, highly available and optimized to meet next generation networking and media processing needs.
âAdvantechâs Networks and Communication Group has been both an innovator and trusted enabling partner in the telecommunications and network security markets for over a decade, designing and manufacturing products for OEMs that accelerate their network platform evolution and time to market.â Said Advantech Vice President of Networks & Communications Group, Ween Niu. âIn the new IP Infrastructure era, we will be expanding our expertise in Software Defined Networking (SDN) and Network Function Virtualization (NFV), two of the essential conduits to 5G infrastructure agility making networks easier to install, secure, automate and manage in a cloud-based infrastructure.â
In addition to innovation in air interface technologies and architecture extensions, 5G will also need a new generation of network computing platforms to run the emerging software defined infrastructure, one that provides greater topology flexibility, essential to deliver on the promises of high availability, high coverage, low latency and high bandwidth connections. This will open up new parallel industry opportunities through dedicated 5G network slices reserved for specific industries dedicated to video traffic, augmented reality, IoT, connected cars etc. 5G unlocks many new doors and one of the keys to its enablement lies in the elasticity and flexibility of the underlying infrastructure.
Advantechâs corporate vision is to enable an intelligent planet. The company is a global leader in the fields of IoT intelligent systems and embedded platforms. To embrace the trends of IoT, big data, and artificial intelligence, Advantech promotes IoT hardware and software solutions with the Edge Intelligence WISE-PaaS core to assist business partners and clients in connecting their industrial chains. Advantech is also working with business partners to co-create business ecosystems that accelerate the goal of industrial intelligence."
Watch the video: https://wp.me/p3RLHQ-lPQ
* Company website: https://www.advantech.com/
* Solution page: https://www2.advantech.com/nc/newsletter/NCG/SKY/benefits.html
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
A short video & presentation looking at when 5G icon is displayed on Smartphones, especially with Non-Standalone (Option 3 / EN-DC) deployment.
All our slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
A short video & presentation looking at what is meant by Non-Terrestrial Networks or NTN as being defined by 3GPP
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
This presentation takes a look at the technology roadmap for 5G NR millimeter wave (mmWave). Including features such as integrated access and backhaul (IAB), enhancements in beam management, mobility, coverage, and more. For more information, please visit www.qualcomm.com/mmwave
A big challenge for mobile network operators in the new, ever-evolving 5G era is the signaling security of the standardized protocols used in order to exchange data. Telecommunication companies face this challenge and have to be on the verge every time there is a potential hacker attack. What is the best way to approach these striking threats and even to be ready before it occurs?
In our webinar, Positive Technologies will offer you several breakthrough strategies on how to deal with security flaws in telecom.
Our expert will show you the evolution of protocol security, share insights into the potential activities of a hacker and give useful advice about compliance with security standards.
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
Â
This document discusses transport layer protocols for mobile ad hoc networks (MANETs). It begins with an introduction to MANETs and the need for new network architectures and protocols to support new types of networks. It then provides an overview of TCP/IP and how TCP works, including congestion control mechanisms. The document discusses challenges for TCP over wireless networks, where packet losses are often due to errors rather than congestion. It covers different versions of TCP and their approaches to congestion control. The goal is to design transport layer protocols that can address the unreliable links and frequent topology changes in MANETs.
The 5G architecture uses an entirely IP-based model to integrate various radio access technologies and provide quality service through cognitive radio technology. It converges different networks on a 5G MasterCore that can efficiently operate in parallel modes to control all networks and enable new combined services globally through an innovative World Combination Service Mode.
The document provides an introduction to 5G architecture and use cases. It discusses how 5G aims to support services with diverse requirements through enhanced mobile broadband, massive machine type communication, and ultra-reliable low latency communication. 5G will have several deployment scenarios including non-standalone using LTE infrastructure initially, and standalone 5G networks. The core network is expected to see the most radical innovation since 2G, moving to a cloud-native architecture with network slicing, separation of control and user plane, and network functions that can be deployed flexibly. The smart grid is presented as a challenging use case that may benefit from 5G capabilities such as low latency and connectivity of millions of devices.
Millimeter wave technology uses high-frequency signals between 25GHz and 300GHz to enable 5G networks to provide faster wireless connectivity. It allows for higher bandwidth and data transfer rates up to 100 times faster than current 4G networks. While millimeter wave technology provides significant advantages like high speeds and large bandwidth, it also faces disadvantages such as poor penetration and interference from rain or oxygen. 5G networks using millimeter wave technology have the potential to deliver multi-Gbps wireless connectivity and fulfill the demands of "4A" wireless services - available at any time, anywhere, with an affordable cost and at any rate.
Digital transformation is at a critical juncture, with a diverse range of industries making changes that signifi-
cantly transform the way people live and work. These shifts have been driving advancements in the financial,
transportation, manufacturing, governmental, and many more sectors. Innovative mobile broadband technologies,
an underlying infrastructure, are a key driving force behind the digitalization of all walks of life. With
the rapid development of 5G, an increasing number of new applications and business models will reshape
the social and economic formation.
Such changes will stimulate strategic planning regarding industry opportunities, technical evolution,
network architecture, and other areas. Telecom operators are growing increasingly concerned with the
creation of a new target network to maximize return on investment (ROI) and achieve business success while
maintaining a competitive edge for the future. Global operators are promoting early deployment of 5G and
innovative business models through continuous 4G evolution. This has led to today's business achievements
and has laid a solid foundation for the huge potential of 5G.
With a gradual consensus being formed for the entire industry, all related players in the industry chain will
develop close collaboration to embrace a brighter future for the wireless network industry.
Continuous 4G evolution, a road to 5G!
Making 5G New Radio a Reality - by QualcommAydin Karaer
Â
Qualcomm is developing 5G NR technology to enable a unified 5G air interface that can address diverse spectrum types, services, and deployments. 5G will transform industries and society by connecting billions of devices and delivering new immersive experiences with requirements such as ultra-low latency and ultra-high reliability. Qualcomm is leading innovations for 5G NR such as advanced channel coding, massive MIMO, and mobilizing mmWave to achieve the speed, capacity, and low latency goals of 5G over the next decade.
The document provides an overview of the Generic Framing Procedure (GFP) networking standard. It describes GFP's frame format and two modes: framed and transparent. Framed GFP maps each client frame into a GFP frame, while transparent GFP allows mapping multiple client data streams. Applications discussed include packet routing over SONET/SDH links using GFP, resilient packet rings using a ring header, and extending LANs/SANs over WANs using transparent encapsulation.
Part 10: 5G Use cases - 5G for Absolute Beginners3G4G
Â
This document discusses 5G use cases. It describes augmented reality, virtual reality, and mixed reality experiences that 5G will enable. Specific use cases mentioned include AR games, monitoring and surveillance, fixed wireless access for indoor internet, connected cars for infotainment, and connected stadiums. Additional use cases discussed are private and industrial networks, cellular vehicle-to-everything communications, and autonomous driving through 5G-enabled truck platooning. The document concludes with a table summarizing 5G's enhanced mobile broadband, massive machine-type communications, and ultra-reliable low latency capabilities and the applications they will support.
5G & Edge: High Performance with Zero-Trust SecurityRebekah Rodriguez
Â
5G and edge computing enable new enterprise use cases by providing faster internet speeds, lower latency, and the ability to connect more devices. However, fully realizing the benefits of 5G presents challenges related to regulations, integration of telecom and IT systems, evolving specifications, and security risks from a larger attack surface and network complexity. A zero trust security model that verifies all connections and limits access based on need can help address these risks. Edge computing deployments close to devices and data sources are also needed to achieve the low latency promised by 5G.
The document discusses Cloud RAN and its evolution to 5G networks. It covers key aspects of Cloud RAN including disruptive challenges like increasing bits per second per hertz, network virtualization, low latency requirements, and open interfaces. It also provides an overview of Cloud RAN architecture and how Mavenir's solutions align with an evolution from 4G to 5G networks through cloudification of the RAN.
1. Serial0 is up but the line protocol is down, indicating a potential issue with the cable or configuration settings not matching on both ends.
2. Static IP addresses are manually assigned while dynamic IP addresses are assigned by a DHCP server from its IP range, and have a lease duration after which the address may change.
3. Protocols establish rules and standards for moving data across a network, such as routing protocols like RIP, IGRP, and EIGRP that determine the best path between networks.
The document discusses the business case for Layer 2 MPLS VPNs. It outlines how MPLS L2VPNs allow service providers to leverage their IP infrastructure while continuing to offer Frame Relay and ATM services to customers. MPLS L2VPNs provide Layer 2 connectivity and allow for a gradual migration to Ethernet and IP-based networks. The key benefits are reducing costs by consolidating services on a single IP infrastructure while maintaining revenue from existing Frame Relay/ATM customers.
The document discusses how NAV (Network Administration Visualized) was developed to automatically detect network topologies using SNMP to collect data from routers and switches. NAV processes the data to map layer 2 and layer 3 topologies as well as VLAN configurations to provide network monitoring, outage alerts, and statistics. It maps IP and MAC addresses to end users' switch ports and logs their connectivity. NAV was later expanded to include features like weather maps, IPv6 deployment statistics, and support across Norwegian universities.
This document provides an introduction to Ethernet and related networking concepts. It discusses local area networks (LANs), common network devices like hubs, bridges and routers. It also covers the OSI model layers and protocols that operate at each layer. The document explains Ethernet frames, including the fields within a basic frame and how frames are tagged to support virtual LANs (VLANs). It provides details on single and double VLAN tagging using IEEE 802.1Q.
Live at OFC 2019, general co-chair JĂśrg-Peter Elbers talked practicalities for commercial quantum-safe DCI deployments built on quantum key distribution and post-quantum cryptography.
The document discusses various long range IoT technologies, including both 3GPP standards like NB-IoT, LTE-M as well as non-3GPP low power wide area network (LPWAN) technologies. It provides details on popular LPWAN technologies like LoRaWAN, Sigfox, and RPMA, outlining their key characteristics such as operating frequency, throughput, range, and current deployment status. The document also examines aspects of the LoRaWAN protocol like device classes, spread spectrum techniques, and network architecture.
The document is a training report submitted by Sagar Shashank summarizing his CCNA training completed at CETPA INFOTECH PVT. LTD. from June 20 to July 31, 2018. It includes an introduction to networking concepts and protocols like IP, ICMP, routing protocols, switching technologies and OSI model. The report contains detailed explanations of topics covered during the training along with declarations and acknowledgements.
This document is the syllabus for a wireless mobile communications course taught during the 2018-2019 academic year. The subject teacher is Mr. Kupade K A and the syllabus covers topics such as CDPD protocols, GPRS network architecture, medium access control, Bluetooth protocols, and references mobile communications textbooks. It outlines the key concepts and technologies that will be covered over the course of the academic year.
The document outlines key concepts related to IPv4 and IPv6 including:
- IPv4 uses 32-bit addresses and IPv6 uses 128-bit addresses. IPv6 simplifies the header format and introduces extension headers.
- It describes IP address classes in IPv4 and differences between IPv4 and IPv6 addressing schemes, header formats, and features like built-in security.
- Transitioning from IPv4 to IPv6 poses challenges around increased management complexity, interoperability problems, and security concerns due to shared communication resources between the protocols.
The Considerations for Internet of Things @ 2017Jian-Hong Pan
Â
çŠčŻçś˛ćŻä¸ééééč¨ďźĺ°çŤŻéťčéĺ°çčłćďźéä¸éčŻĺćďźä¸Śĺ°ĺćçľćç¨äťĽćąşç丌ĺéĽç塼ç¨ččĄă
ćŹćŹĄçĺ亍ĺ°ĺžçŠčŻçś˛ççŽççśä˝é˛ĺ ĽéťďźćĽčĺ亍ĺŻč˝çä˝ç˝˛ćść§ă丌ćŚčż°çŽĺĺĺ常ç¨çéč¨ć¨ćşăĺĺŽďźäťĽĺĺ ść幏çč§č˛ă
é¤ć¤äšĺ¤ďźäšćĺ亍ĺťĺš´ĺ°ććĺĺ Linux Foundationč螌çOpen IoT Summit Europe 2016çĺżĺžă
ĺ¨ć¤ďźĺ¸śĺä¸äşĺĺ¤ĺ°ćźçŠčŻçś˛çŻéťçä˝ç˝˛ăć´ć°ćçśčˇççćłăä˝ćłă
ĺŚĺ¤ďźäšćĺ亍ä¸äşçŠčŻçś˛ĺŻč˝éčŚčéçčłč¨ĺŽĺ ¨č°éĄă
IoT is a kind of engineering art, which analyzes the collected data from
the device nodes through the communication and has the result for the
decision making and feedback.
This sharing goes for the purpose of IoT and it's deployment structure.
Then, the slide introduces the most used communication standards or
protocols in IoT and their roles.
Besides, also shares what I have got from the Open IoT Summit Europe 2016
which was held by Linux Foundation in Berlin last year.
It introduces how will the device nodes be deployed, updated and maintained.
Finally, the slide provides some security issues that should be considered
in IoT.
This document discusses encryption in data center and fiber optic networks. It notes that Edward Snowden revealed that unencrypted communications are no longer safe. It then discusses how data centers secure physical access, hardware, software and fiber connections. It explains that encryption on the lowest network layer provides the highest security. The document presents ADVA's encryption solutions for 10G and 100G networks, including key lengths and management systems. It notes over 1,600 encrypted links are currently in operation across finance, government, healthcare and other industries.
LTE network planning includes coverage and capacity planning. Key aspects of LTE network planning covered in the document include the flat LTE network architecture, use of OFDM in the physical layer, and introduction of techniques like MIMO, ICIC, link budget analysis, and capacity estimation. The document also provides an overview of RNP solutions for interference avoidance, co-antenna analysis, and other performance enhancement features.
This document provides an overview of Bluetooth technology. It discusses what Bluetooth is, its history and development by the Bluetooth Special Interest Group. The key technical features of Bluetooth like its operating spectrum, data rates, encryption standards and classifications are explained. The document also outlines the Bluetooth protocol stack including the baseband, link manager and middleware layers. Common Bluetooth profiles and potential applications are reviewed. Finally, the security measures used by Bluetooth and its advantages compared to alternatives like infrared are summarized.
Efficient Topology Discovery in Software Defined NetworksFarzaneh Pakzad
Â
Efficient topology discovery in software defined networks
Farzaneh Pakzad, Marius Portmann, Wee Lum Tan, Jadwiga Indulska
ABSTRACT Software Defined Networking (SDN) is a new networking paradigm, with a great potential to increase network efficiency, ease the complexity of network control and management, and accelerate the rate of technology innovation. One of the core concepts of SDN is the separation of the network's control and data plane. The intelligence and the control of the network operation and management, such as routing, is removed from the forwarding elements (switches) and is concentrated in a logically centralised component, i.e. the SDN controller. In order for the controller to configure and manage the network, it needs to have up-to-date information about the state of the network, in particular its topology. Consequently, topology discovery is a critical component of any Software Defined Network architecture. In this paper, we evaluate the cost and overhead of the de facto standard approach to topology discovery currently implemented by the major SDN controller frameworks, and propose simple and practical modifications which achieve a significantly improved efficiency and reduced control overhead. We have implemented our new topology discovery approach on the widely used POX controller platform, and have evaluated it for a range of network topologies via experiments using the Mininet network emulator. Our results show that our proposed modifications achieve an up to 45% reduction in controller load compared to the current state-of-the-art approach, while delivering identical discovery functionality.
Fulltext :
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=7021050&queryText%3DEfficient+topology+discovery+in+software+defined+networks
The document outlines an agenda for a Safe Harbor meeting with 6 presentations on topics related to software-defined networking (SDN). The schedule includes introductions from Dan Pitt of the Open Networking Foundation and David Meyer, followed by presentations from Jennifer Rexford on Frenetic and Mike Freedman on service-centric networking. The meeting will conclude with closing remarks and a social gathering. The document provides context on SDN and topics like OpenFlow, declarative network programming, and new network architectures.
This document provides information about networking concepts for the CCNA exam, including transmission media, network interface cards, protocols, addresses, hubs, switches, routers, and the OSI model. It defines common networking cable types and standards like Ethernet and their associated bandwidths. It also covers IP addressing schemes including public/private IP ranges, subnetting of IP classes A, B and C, and default subnet masks. Network communication methods like unicast, broadcast and multicast are defined.
At Namex Annual Meeting 2022, Christoph Glingener discussed the threat that quantum computers pose to network security and talked about addressing this significant cybersecurity risk with quantum key distribution and post-quantum cryptography.
This document provides an overview of TCP/IP addressing concepts including:
- IP addresses are divided into network and host portions based on their class (A, B, or C).
- Subnetting allows a network to be divided into multiple subnets using subnet masks to define the network and host portions of IP addresses.
- When planning IP addressing, considerations include determining subnets, assigning addresses to subnets and hosts, and ensuring local and remote hosts can be identified.
The document discusses optical networking services and applications. It outlines Tal Lavian's research focus on building service composition and infrastructure for optical networks. It then provides an agenda covering optical networking technologies, challenges, service solutions like optics combined with Ethernet, and potential killer applications such as large data exchange and content networking.
Similar to Muriel Medard - Network Coding in Satellites - Global SIP 2018 (20)
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
Â
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
Â
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfflufftailshop
Â
When it comes to unit testing in the .NET ecosystem, developers have a wide range of options available. Among the most popular choices are NUnit, XUnit, and MSTest. These unit testing frameworks provide essential tools and features to help ensure the quality and reliability of code. However, understanding the differences between these frameworks is crucial for selecting the most suitable one for your projects.
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Â
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Â
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Donât worry, we can help with all of this!
Weâll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. Weâll provide examples and solutions for those as well. And naturally weâll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Â
Are you ready to revolutionize how you handle data? Join us for a webinar where weâll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, weâll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sourcesâfrom PDF floorplans to web pagesâusing FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether itâs populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
Weâll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Â
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Â
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Â
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Fueling AI with Great Data with Airbyte WebinarZilliz
Â
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Dive into the realm of operating systems (OS) with Pravash Chandra Das, a seasoned Digital Forensic Analyst, as your guide. đ This comprehensive presentation illuminates the core concepts, types, and evolution of OS, essential for understanding modern computing landscapes.
Beginning with the foundational definition, Das clarifies the pivotal role of OS as system software orchestrating hardware resources, software applications, and user interactions. Through succinct descriptions, he delineates the diverse types of OS, from single-user, single-task environments like early MS-DOS iterations, to multi-user, multi-tasking systems exemplified by modern Linux distributions.
Crucial components like the kernel and shell are dissected, highlighting their indispensable functions in resource management and user interface interaction. Das elucidates how the kernel acts as the central nervous system, orchestrating process scheduling, memory allocation, and device management. Meanwhile, the shell serves as the gateway for user commands, bridging the gap between human input and machine execution. đť
The narrative then shifts to a captivating exploration of prominent desktop OSs, Windows, macOS, and Linux. Windows, with its globally ubiquitous presence and user-friendly interface, emerges as a cornerstone in personal computing history. macOS, lauded for its sleek design and seamless integration with Apple's ecosystem, stands as a beacon of stability and creativity. Linux, an open-source marvel, offers unparalleled flexibility and security, revolutionizing the computing landscape. đĽď¸
Moving to the realm of mobile devices, Das unravels the dominance of Android and iOS. Android's open-source ethos fosters a vibrant ecosystem of customization and innovation, while iOS boasts a seamless user experience and robust security infrastructure. Meanwhile, discontinued platforms like Symbian and Palm OS evoke nostalgia for their pioneering roles in the smartphone revolution.
The journey concludes with a reflection on the ever-evolving landscape of OS, underscored by the emergence of real-time operating systems (RTOS) and the persistent quest for innovation and efficiency. As technology continues to shape our world, understanding the foundations and evolution of operating systems remains paramount. Join Pravash Chandra Das on this illuminating journey through the heart of computing. đ
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Â
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
2. Private and Confidential
Presentation by Muriel Medard @
27 November, Anaheim, California
2018 IEEE Global Conference
on Signal and Information Processing
2
8. Private and Confidential
RLNC for throughput
Allow more errors
At the PHY
Error-rate performance
(AWGN channel) for RS
codes (255, 239, 17) and
(255, 223, 33) in red,
along with PHY
and Effective RLNC Error
Rates with {0.5, 1,
1.5, 2, 2.5, 3}. Note that
the cost of extra
redundancy is taken into
account through a shift in
Eb/No level, whereas
throughput is kept
constant.
âRLNC as a Network-Layer Code
A study of RLNC as a complement to physical-layer codingâ
CodeOn White Paper Feb 2018
8
9. Private and Confidential
RLNC at transport
Integrating with TCP
J. K. Sundararajan, Shah, D., MĂŠdard, M., Jakubczak, S., Mitzenmacher, M. and Barros, J.,
âNetwork Coding Meets TCP: Theory and Implementationâ,
invited paper, Proceedings of the IEEE, March 2011, pp. 490 â 512
9
11. Private and Confidential
TCP without coding
Window ceases to progress
TCPsender
window
p1 p2 p3 p4
p1
p2
p3
ACK(p1)
ACK(p1)
p2 p3 p4 p5 p5
ACK(p1)
p2 p3
p4
ACK(p1)
receiver
M. Kim, Cloud, J., ParandehGheibi, A., Urbina, L., Fouli, K., Leith, D., and MĂŠdard, M.,
âCongestion Control for Coded Transport Layersâ,
IEEE ICC Communication QoS, Reliability and Modeling Symposium 2014
11
12. Private and Confidential
TCP with coding
Window continues to progress
Prevents random losses being
interpreted as congestion
Coded TCPsender
window
p1 p2 p3 p4
ÎŁp
SEEN(1)
SEEN(2)
p4 p5 p6 p7
SEEN(4)
SEEN(5)
SEEN(6)
ÎŁp
ÎŁp
ÎŁp
ÎŁp
ÎŁp
ÎŁp
SEEN(3)
p7 p8 p9 p10 p11
SEEN(7)
ÎŁp
p8 p9 p10 p11 p12
receiver
12
13. Private and Confidential
The four phases of queue oscillation
1. Sat gate queue not full. TCP senders
receive ACKs, increase congestion window.
Queue builds up.
2. Sat gate queue full. New packets arriving
are dropped. Senders still receive ACKs
and send more
data in the direction of the queue. Queue
continues to overflow: burst losses
3. ACKs from dropped packets become
overdue. Senders throttle back. Packet
arrival at queue slows to a trickle. Queue
drains.
4. Queue clears completely. Link sits idle for
part of the time, link not fully utilized
Note: Queue oscillation explains the packet loss phenomena on all sat links we studied
U. Speidel, L. Qian, âE. Cocker, P. Vingelmann, J. Heide, M. MĂŠdard,
âCan Network Coding Mitigate TCP-induced Queue Oscillation on Narrowband Satellite Links?â,
International Conference on Wireless and Satellite Systems, 301â314, Springer International Publishing, July 2015
13
14. Private and Confidential
Transport needs to be adapted to high RTT
Simple modification
0 0.02 0.04 0.06 0.08 0.1 0.12 0.14 0.16 0.18 0.2
0
1
2
3
4
5
6
7
x 10
6
PER
Goodput(bps)
CTCPv1
CTCPv2
HTCP
Cubic
Hybla
Reno
Veno
Westwood
Rate = 10 Mbps, RTT = 500 ms
J. Cloud, Leith, D, and MĂŠdard, M. âNetwork Coded TCP (TCP) Performance over
Satellite Networksâ, SPACOMM 2014
14
15. Private and Confidential
RLNC for Satellite in the Pacific
15
⢠O3b satellite connection
⢠Typical peak time link utilization around 50%
⢠TCP/NC encoders/decoders in Avarua and Auckland
⢠g=30, overhead variable based on feedback
⢠TCP/NC running alongside standard TCP
⢠Would probably need less overhead if all
connections were coded
Rarotonga
U. Speidel, Cocker, âE., Vingelmann, P., Heide, J., and MĂŠdard, M.,
âCan Network Coding Bridge the Digital Divide in the Pacific?â, Netcod 2015
U. Speidel, Cocker, âE., MĂŠdard, M., Heide, J., amd Vingelmann, P.,
âTopologies for the Provision of Network-Coded Services via Shared Satellite Channelsâ, SPACOMM 2017 (Winner Best Paper Award)
16. Private and Confidential
RLNC for Satellite in the Pacific
Funafuti, Tuvalu
16
⢠GEO downlink (16 Mbps)
⢠TCP supported by SilverPeak accelerator
⢠Very low link utilization below 25%
TCP/NC maintains steady goodput
with 1-10% packet loss
TCP/NC can complete some downloads
even with >10% packet loss
U. Spiedel, Cocker, âE., Vingelmann,
P., Heide, J., and MĂŠdard, M., âCan
Network Coding Bridge the Digital
Divide in the Pacific?â, Netcod 2015
P. Vingelmann, J. Heide, M. MĂŠdard,
âCan Network Coding Mitigate TCP-
induced Queue Oscillation on
Narrowband Satellite Links?,
International Conference on Wireless
and Satellite Systems, 2015
U. Speidel, Cocker, âE., MĂŠdard, M.,
Heide, J., amd Vingelmann, P.,
âTopologies for the Provision of
Network-Coded Services via Shared
Satellite Channelsâ, SPACOMM 2017
TCP/NC
experiments
Graphic: own measurement
18. Private and Confidential
Coding and delay
Packet reception time
18
J. Cloud, D. Leith, and M.
MĂŠdard, âA Coded
Generalization of Selective
Repeat ARQâ, INFOCOM 2015
M. Karzand, Leith, D., Cloud, J.,
and MĂŠdard, M., âDesign of
FEC for Low Delay in 5Gâ, IEEE
Journal of Selected Areas in
Communication, Vol. 35, No. 8,
Aug. 2017, pp. 1783- 1793
19. Private and Confidential
Coding and delay
Packet reception time
19
J. Cloud, D. Leith, and M.
MĂŠdard, âA Coded
Generalization of Selective
Repeat ARQâ, INFOCOM 2015
(RLNC)
22. Private and Confidential
Satellite broadcast with feedback
TDD
dofs to decode:
dofs to decode:
dofs to decode:Rx 1
Rx 2
Rx N
Tx
M packets
M
M
M
dofs = degrees of freedom
D. Lucani, MĂŠdard, M., and Stojanovic, M., âOn Coding for Delay - Network Coding for Time Division Duplexingâ,
IEEE Transactions on Information Theory, vol. 58, no. 4, April 2012, pp. 2330 - 2348
22
27. Private and Confidential
Multiple paths
Keeping track of packets
IP flow 1 IP flow 2
Application layer
IP flow 1 IP flow 2
Application layer
Server Client
Lte NIC WiFi NIC
Block i Block i
Divide & Schedule Combine
Media
player
p1p2p3 ⌠pw p1p2p3 ⌠pw p1p2p3 ⌠pw
Block 1 Block 2 Block 3 âŚ
âŚ
Request block i
Media file:
p1
p3
p5
p2
p4
p6
J. Cloud, du Pin Calmon, F., Zeng, W., Pau, G., Zeger, L., and MĂŠdard, M.,
âMulti-Path TCP with Network Coding for Mobile Devices in Heterogeneous Networksâ,
VTC 2013
27
28. Private and Confidential
Multiple paths
Keeping track of packets
IP flow 1 IP flow 2
Application layer
IP flow 1 IP flow 2
Application layer
Server Client
Lte NIC WiFi NIC
Block i Block i
Divide & Schedule Combine
Media
player
p1p2p3 ⌠pw p1p2p3 ⌠pw p1p2p3 ⌠pw
Block 1 Block 2 Block 3 âŚ
âŚ
Request block i
Media file:
p1+p4
p2+p3
p1+p5
p2+p4
p3+p6
p4+p5
28
29. Private and Confidential
MTP/NC
Coding over
multiple paths
All packets within
the MPTCP/NC
coding window
are coded
together and
pushed to
different sub-
flows
Application
MPTCP/NC
TCP TCP
Fast-
TCP/NC
Fast-
TCP/NC
IP IP
NETWORK
Network
Interface
Network
Interface
Application
MPTCP/NC
TCP TCP
Fast-
TCP/NC
Fast-
TCP/NC
IP IP
Network
Interface
Network
Interface
Network Coding and Reliable Communications Group
29
30. Private and Confidential
MTP/NC
Coding over
multiple paths
All received
packets are
ACKâed
All packets within
the MPTCP/NC
coding window
are coded
together and
pushed to
different sub-
flows
Each packet from
TCP generates R
linearly
independent coded
packets where
each packet is
generated from the
set of packets
within the TCP
window
Application
MPTCP/NC
TCP TCP
Fast-
TCP/NC
Fast-
TCP/NC
IP IP
NETWORK
Network
Interface
Network
Interface
Application
MPTCP/NC
TCP TCP
Fast-
TCP/NC
Fast-
TCP/NC
IP IP
Network
Interface
Network
Interface
Each received
packet is
immediately
forwarded to
the TCP layer
Network Coding and Reliable Communications Group
30
31. Private and Confidential
MTP/NC
Coding over
multiple paths
All received
packets are
ACKâed
All packets within
the MPTCP/NC
coding window
are coded
together and
pushed to
different sub-
flows
Each packet from
TCP generates R
linearly
independent coded
packets where
each packet is
generated from the
set of packets
within the TCP
window
Application
MPTCP/NC
TCP TCP
Fast-
TCP/NC
Fast-
TCP/NC
IP IP
NETWORK
Network
Interface
Network
Interface
Application
MPTCP/NC
TCP TCP
Fast-
TCP/NC
Fast-
TCP/NC
IP IP
Network
Interface
Network
Interface
MPTCP/NC
layer ACKs
all new
degrees of
freedom
received
Decoding only
occurs at the
MPTCP/NC
layer
Each received
packet is
immediately
forwarded to
the TCP layer
Network Coding and Reliable Communications Group
31
32. Private and Confidential
MTP/NC
Different delays
log
10
(File Size)
Averagecompletiontime(ms)
Link 1: RTT =1500ms p = 10â3
Link 2: RTT =80ms p = 10â2
3 4 5 6
10
2
10
3
10
4
10
5
10
6
10
7
10
8
Uncoded
Coded, R=(1âp)â1
Coded, R=1.05(1âp)â1
log(File Size)
AverageRate(packet/s)
Link 1: RTT =1500ms p = 10â3
Link 2: RTT =80ms p = 10â2
3 4 5 6
0
200
400
600
800
1000
1200
1400
Uncoded
Coded, R=(1âp)â1
Coded, R=1.05(1âp)â1
Time (s)
Jointwindowwize(packets)
Link 1: RTT=1500ms, p = 10â2
Link 2: RTT=80ms, p = 10â1
0 10 20 30 40 50 60 70
0
50
100
150
200
250
Coded, R=(1âp)â1
Coded, R=1.05(1âp)â1
Uncoded
X
X
Network Coding and Reliable Communications Group
32
33. Private and Confidential
MTP/NC
Different delays
log(File Size)
AverageRate(packet/s)
Link 1: RTT =1500ms p = 10â3
Link 2: RTT =15ms p = 10â2
3 4 5 6
0
500
1000
1500
2000
2500
3000
3500
4000
4500
5000
Uncoded
Coded, R=(1âp)â1
Coded, R=1.05(1âp)â1
log10
(File Size)
Averagecompletiontime(ms)
Link 1: RTT =1500ms p = 10â3
Link 2: RTT =15ms p = 10â2
3 4 5 6
10
2
10
3
10
4
10
5
10
6
10
7
10
8
Uncoded
Coded, R=(1âp)â1
Coded, R=1.05(1âp)â1
Time (s)
Jointwindowwize(packets)
Link 1: RTT=1500ms, p = 10â3
Link 2: RTT=15ms, p = 0.3
0 5 10 15 20
0
20
40
60
80
100
120
140
160
180
200
Coded, R=(1âp)â1
Coded, R=1.05(1âp)â1
Uncoded
X
X
Network Coding and Reliable Communications Group
33
34. Private and Confidential
Recoding
No need to decode
CODING THE NETWORK:
NEXT GENERATION
CODING FOR FLEXIBLE
NETWORK OPERATION
IEEE CTN Issue: July 2018
K. Fouli, M. Medard, K. Shroff
34
36. Private and Confidential
Satellite Context
Multiple Relevant Topologies
36
Brunel.ac.uk
Mobile
Mesh
F. Vieira et al., Satcom 2011
Multipath
Multicast
Multipath
Heterogeneous
Multi-hop
Multi-hop
kddi.com
37. Private and Confidential
Recoding with losses
Different losses
1 2 4
sender
From
given
data
receiver
Recoding at intermediate nodes, without decoding
37
3
38. Private and Confidential
Recoding with losses
Different losses
TCP End-to-end coding Re-encoding at node 3 only
0.0042 Mbps 0.1420 Mbps 0.2448 Mbps
(assuming each link has a bandwidth of 1 Mbps in the absence of erasures)
Time average throughput (over 641 seconds)
38
40. Private and Confidential
Future aspects
⢠Recoding at satellite
⢠Edge caching with coding
⢠On-the-ground peer-assisted satellite content delivery
⢠Coding for multi-beam
⢠Multi-sourcing with satellite
⢠Secure coding
Coding throughout
40
41. Private and Confidential 41
This document was created by Code On Network Coding LLC (âCode Onâ), a limited liability company based in Cambridge, MA, with
registered offices at One Broadway, Floor 14, Cambridge, Massachusetts, 02142. All rights thereto are owned and reserved by Code On.
This strictly private and confidential document was prepared exclusively for information purposes only and for discussion. This
document is incomplete without reference toâand should be viewed solely in conjunction withâthe oral presentation provided by Code
On.
While all reasonable care has been taken to ensure that the facts stated herein and in the accompanying oral presentation are accurate
and that the opinions contained herein and in such presentation are fair and reasonable, the information provided is selective in nature
and is intended to serve as an introduction and overview of, the content described herein. Any opinions expressed in this document
and/or the accompanying presentation is subject to change without notice and neither Code On nor any other person is under any
obligation to update or keep current such information. No representation, undertaking, promise or warranty, express or implied, is or
will be made, or given as to, and no responsibility or liability is or will be accepted by Code On, its respective directors, officers, agents or
employees in relation to the adequacy, accuracy, completeness or reasonableness of this document or any other information (whether
written or oral), notice or document supplied or otherwise made available to any third or their respective advisers in connection with
this document.
This document and the information provided in the accompanying presentation is confidential and of a proprietary nature. This
document may not be reproduced or redistributed outside the recipient's organisation or publicised in whole or in part for any purpose,
including to the press or any media organization, without the express prior written consent of Code On.
No right or entitlement to an implementation of the presentation or the concepts presented herein arises from this document and/or
the presentation.
Disclaimer