2,046 research outputs found

    Equipment concept design and development plans for microgravity science and applications research on space station: Combustion tunnel, laser diagnostic system, advanced modular furnace, integrated electronics laboratory

    Get PDF
    Taking advantage of the microgravity environment of space NASA has initiated the preliminary design of a permanently manned space station that will support technological advances in process science and stimulate the development of new and improved materials having applications across the commercial spectrum. Previous studies have been performed to define from the researcher's perspective, the requirements for laboratory equipment to accommodate microgravity experiments on the space station. Functional requirements for the identified experimental apparatus and support equipment were determined. From these hardware requirements, several items were selected for concept designs and subsequent formulation of development plans. This report documents the concept designs and development plans for two items of experiment apparatus - the Combustion Tunnel and the Advanced Modular Furnace, and two items of support equipment the Laser Diagnostic System and the Integrated Electronics Laboratory. For each concept design, key technology developments were identified that are required to enable or enhance the development of the respective hardware

    Security of 5G-V2X: Technologies, Standardization and Research Directions

    Full text link
    Cellular-Vehicle to Everything (C-V2X) aims at resolving issues pertaining to the traditional usability of Vehicle to Infrastructure (V2I) and Vehicle to Vehicle (V2V) networking. Specifically, C-V2X lowers the number of entities involved in vehicular communications and allows the inclusion of cellular-security solutions to be applied to V2X. For this, the evolvement of LTE-V2X is revolutionary, but it fails to handle the demands of high throughput, ultra-high reliability, and ultra-low latency alongside its security mechanisms. To counter this, 5G-V2X is considered as an integral solution, which not only resolves the issues related to LTE-V2X but also provides a function-based network setup. Several reports have been given for the security of 5G, but none of them primarily focuses on the security of 5G-V2X. This article provides a detailed overview of 5G-V2X with a security-based comparison to LTE-V2X. A novel Security Reflex Function (SRF)-based architecture is proposed and several research challenges are presented related to the security of 5G-V2X. Furthermore, the article lays out requirements of Ultra-Dense and Ultra-Secure (UD-US) transmissions necessary for 5G-V2X.Comment: 9 pages, 6 figures, Preprin

    Applying SDN to Mobile Networks: A New Perspective for 6G Architecture

    Full text link
    The upcoming Sixth Generation (6G) mobile communications system envisions supporting a variety of use cases with differing characteristics, e.g., very low to extremely high data rates, diverse latency needs, ultra massive connectivity, sustainable communications, ultra-wide coverage etc. To accommodate these diverse use cases, the 6G system architecture needs to be scalable, modular, and flexible; both in its user plane and the control plane. In this paper, we identify some limitations of the existing Fifth Generation System (5GS) architecture, especially that of its control plane. Further, we propose a novel architecture for the 6G System (6GS) employing Software Defined Networking (SDN) technology to address these limitations of the control plane. The control plane in existing 5GS supports two different categories of functionalities handling end user signalling (e.g., user registration, authentication) and control of user plane functions. We propose to move the end-user signalling functionality out of the mobile network control plane and treat it as user service, i.e., as payload or data. This proposal results in an evolved service-driven architecture for mobile networks bringing increased simplicity, modularity, scalability, flexibility and security to its control plane. The proposed architecture can also support service specific signalling support, if needed, making it better suited for diverse 6GS use cases. To demonstrate the advantages of the proposed architecture, we also compare its performance with the 5GS using a process algebra-based simulation tool.Comment: 11 page

    Elastic Highly Available Cloud Computing

    Get PDF
    High availability and elasticity are two the cloud computing services technical features. Elasticity is a key feature of cloud computing where provisioning of resources is closely tied to the runtime demand. High availability assure that cloud applications are resilient to failures. Existing cloud solutions focus on providing both features at the level of the virtual resource through virtual machines by managing their restart, addition, and removal as needed. These existing solutions map applications to a specific design, which is not suitable for many applications especially virtualized telecommunication applications that are required to meet carrier grade standards. Carrier grade applications typically rely on the underlying platform to manage their availability by monitoring heartbeats, executing recoveries, and attempting repairs to bring the system back to normal. Migrating such applications to the cloud can be particularly challenging, especially if the elasticity policies target the application only, without considering the underlying platform contributing to its high availability (HA). In this thesis, a Network Function Virtualization (NFV) framework is introduced; the challenges and requirements of its use in mobile networks are discussed. In particular, an architecture for NFV framework entities in the virtual environment is proposed. In order to reduce signaling traffic congestion and achieve better performance, a criterion to bundle multiple functions of virtualized evolved packet-core in a single physical device or a group of adjacent devices is proposed. The analysis shows that the proposed grouping can reduce the network control traffic by 70 percent. Moreover, a comprehensive framework for the elasticity of highly available applications that considers the elastic deployment of the platform and the HA placement of the application’s components is proposed. The approach is applied to an internet protocol multimedia subsystem (IMS) application and demonstrate how, within a matter of seconds, the IMS application can be scaled up while maintaining its HA status

    A Model Based Framework for Service Availability Management

    Get PDF
    High availability of services is an important requirement in several domains, including mission critical systems. The Service Availability Forum (SA Forum) is a consortium of telecommunications and computing companies that defines standard middleware solutions for high availability. Availability Management Framework (AMF) manages the high availability of services by coordinating their application components according to redundancy models. To protect these services, AMF requires a configuration, i.e. a representation of the organization of the logical entities composing an application under its control. AMF configuration design is error-prone and tedious if done manually, due to the complexity of the AMF domain. This PhD thesis explores the effective design and analysis of AMF configurations, proposing a model-based management framework that facilitates this process. We propose a domain-specific modeling language that captures AMF domain concepts, relationships, and constraints, facilitating the management of AMF configurations. We define this language by extending UML through its profiling mechanism, capturing the concepts of AMF configurations and the description of the software for which the configuration will be generated. We introduce a new approach for the automatic generation of AMF configurations based on our UML profile using model transformation techniques. This approach consists of a set of transformations from the software description entities into AMF configurations while satisfying the requirements of the services to be provided as well as the constraints of the deployment infrastructure. We also propose a third-party AMF configuration validation approach consisting of syntactical and semantic validations. Syntactical validation checks the well-formedness of third-party configurations by validating them against AMF standard specification requirements captured in our UML profile. Semantic validation focuses on ensuring the runtime protection of services at configuration time (the SI-Protection problem). SI-Protection has combinatorial aspects and results in an NP-hard problem for most redundancy models, which we have tackled by devising a heuristic-based method, overcoming its complexity. We present proofs of concepts by using different available technologies: IBM Rational Software Architect (RSA) for implementing our UML profiles, Eclipse environment for developing a prototype tool for validating third-party configurations, and Atlas Transformation Language (ATL) for developing a prototype implementation of our model-based configuration generation approach

    Network-driven handover in 5G

    Get PDF
    Currently, users’ expectations regarding technological performance are constantly increasing. An example of this is the growing consumption of multimedia content via the Internet. Multimedia applications with a variable number of users/requests have variable demand over time that may expose the limitation of the network channels. This may cause a problem of demand mobility generated by the service/application. Each generation of mobile networks has specific handover processes, which in the case of 4G can be controlled according to the applications requirements, with the possibility of multiconnectivity. This process was massified in 5G. The main contribution of this dissertation is the development and analysis of decision models for controlling the video streaming and user association to a BS in the network architecture. The scenario considered refers to a football stadium with multiple points of view – video streams – that each spectator can request to view on their cell phone or tablet. The developed simulator models the stadium scenario using a combination of services, which occur on the 5G network. Vertical handover generated by the network is used,aidedbynetworkslicing. Thenetworkslicingactsinthepartofthebandwidthdivision between the different antennas and allows the throughput of the different broadcast (FeMBMS)channelsto becontrolledbytheservice -theradionetworkcapacitylimitsthe throughput. The results obtained in a case of 80000 spectators who select different beams over time, considering8basestations(BS),showthatthequalityofexperienceishighonlywhenthe handover and the control of beam diffusion by BS are managed according to the application requirements. The network recovers from huge peaks by handling as many requests at once as possible. Instead of the user only getting the steam in a good quality or not getting it at all, the network performs a best-effort solution of downgrading the quality of multicasting in order to expend less resources with the same quantity of requests. The network state is taken into consideration. Although there are load peaks on the network, it is never congested.Atualmente, as expectativas dos utilizadores em relação à capacidade tecnológica não param de aumentar. Exemplo disso é o crescente consumo de conteúdo multimédia através da Internet. Aplicações multimédia com número variável de utilizadores e pedidos têm um fluxo de serviço variável ao longo do tempo. Esta variância pode expor a limitação de canais de rede, que consequentemente pode causar um problema de mobilidade gerado pelo serviço/aplicação. Cada geração de redes móveis possui processos de handover de utilizadores específicos, que no caso da geração 4G passou a ser controlado em função das aplicações, com a possibilidade de multiconectividade. Este processo foi massificado no 5G. A principal contribuição desta dissertação é o desenvolvimento e análise de modelos de decisão para controlar a difusão de vídeo e a associação de utilizadores à rede rádio na arquitetura da rede. O cenário considerado reflete um estádio de futebol com vários pontos de vista - diferentes feixes de vídeo - que cada espectador pode solicitar e visualizar no seu telemóvel ou tablet. O simulador desenvolvido modela o cenário do estádio usando uma combinação de serviços, que ocorrem na rede 5G. É usado handover vertical gerado pela rede auxiliado por network slicing que atua na parte da divisão da largura de banda entre as diferentes antenas e permite que a taxa de débito dos diferentes canais de difusão (FeMBMS) seja controlada pelo serviço - a capacidade da rede rádio limita a taxa de transferência. Os resultados obtidos no caso de 80000 espectadores que selecionam diferentes feixes ao longo do tempo, considerando 8 estações base (BS), mostram que a qualidade de experiência somente é elevada quando o handover e o controlo da difusão de feixes pelas BS são geridos de acordo com os requisitos da aplicação. A rede recupera a estabilidade após enormes picos de transferência gerindo os seus recursos. Em vez do utilizador ser prejudicado na totalidade quando a rede não tem recursos e ser privado de obter serviço, é utilizado um processo alternativo em que a rede diminui a qualidade de multicasting, gastando menos recursos com a mesma quantidade de pedidos. O estado da rede é sempre tido em consideração - embora hajam picos de carga na rede, esta nunca fica congestionada
    corecore