12 research outputs found

    Teleprotection signalling over an IP/MPLS network

    Get PDF
    Protection of electricity networks have developed to incorporate communications, referred to as protection signalling. Due to the evolution of the electricity supply system, there are many developments pending within the scope of protection signalling and protection engineering in general. This project investigates the use of current and emerging communications technologies (i.e. packetised networks) being applied and incorporated into current protection signalling schemes and technologies. The purpose of the project is to provide a more cost-effective solution to protection schemes running obsolescent hardware. While the medium-term goal of the industry is to move entirely to IEC 61850 communications, legacy teleprotection relays using non-IP communications will still exist for many years to come. For companies to be ready for an IEC 61850 rollout a fully deployed IP/MPLS network will be necessary and it can be seen that various companies worldwide are readying themselves in this way. However, in the short-term for these companies, this means maintaining their existing TDM network (which runs current teleprotection schemes) and IP/MPLS network. This is a costly business outcome that can be minimised with the migration of services from and decommissioning of TDM networks. Network channel testing was the primary testing focus of the project. The testing proved that teleprotection traffic with correct QoS markings assured the system met latency and stability requirements. Furthermore, MPLS resiliency features (secondary LSPs & Fast-reroute) were tested and proved automatic path failover was possible under fault conditions at sub-30ms speeds

    On the Rollout of Network Slicing in Carrier Networks: A Technology Radar

    Get PDF
    Network slicing is a powerful paradigm for network operators to support use cases with widely diverse requirements atop a common infrastructure. As 5G standards are completed, and commercial solutions mature, operators need to start thinking about how to integrate network slicing capabilities in their assets, so that customer-facing solutions can be made available in their portfolio. This integration is, however, not an easy task, due to the heterogeneity of assets that typically exist in carrier networks. In this regard, 5G commercial networks may consist of a number of domains, each with a different technological pace, and built out of products from multiple vendors, including legacy network devices and functions. These multi-technology, multi-vendor and brownfield features constitute a challenge for the operator, which is required to deploy and operate slices across all these domains in order to satisfy the end-to-end nature of the services hosted by these slices. In this context, the only realistic option for operators is to introduce slicing capabilities progressively, following a phased approach in their roll-out. The purpose of this paper is to precisely help designing this kind of plan, by means of a technology radar. The radar identifies a set of solutions enabling network slicing on the individual domains, and classifies these solutions into four rings, each corresponding to a different timeline: (i) as-is ring, covering today’s slicing solutions; (ii) deploy ring, corresponding to solutions available in the short term; (iii) test ring, considering medium-term solutions; and (iv) explore ring, with solutions expected in the long run. This classification is done based on the technical availability of the solutions, together with the foreseen market demands. The value of this radar lies in its ability to provide a complete view of the slicing landscape with one single snapshot, by linking solutions to information that operators may use for decision making in their individual go-to-market strategies.H2020 European Projects 5G-VINNI (grant agreement No. 815279) and 5G-CLARITY (grant agreement No. 871428)Spanish national project TRUE-5G (PID2019-108713RB-C53

    Signalling of Point to Multipoint Trees in Metro Ethernet and Core Networks

    Get PDF
    Diplomityössä tutustuttiin IPTV-kanavien siirtoon Core-verkosta MetroEthernet-verkon asiakasta lähinnä olevalle laidalle. Tavoitteena oli kehittää nopeampi ratkaisu monilähetyspuiden konfigurointiin laitevalmistajan toteuttamilla protokollilla. Nykyinen ratkaisu, jossa käytetään Resource reSerVation Protocol:ia MultiProtocol Label Switching-tunneleiden signaloimiseen, Internet Group Management Protocol Snooping:ia halukkaiden vastaanottajien kartoittamiseen sekä Protocol Independent Multicast-Source Specific Multicast:ia runkoverkon monilähetykseen on liian työläs. Uudet ratkaisut, joissa yhdistellään RSVP:tä, point-to-multipoint RSVP:tä, Fast ReRoutea ja PIM-SSM:ia testataan TeliaSoneran tietoverkkolaboratoriossa. Tulosten perusteella ei voida sanoa paljoa varmasti, mutta FRR ME-verkossa vaikuttaa helppokäyttöiseltä ja toimivalta ratkaisulta. Lisäksi P2MP RSVP-TE herätti toiveita nopeammin vikatilanteista toipuvasta monilähetysratkaisusta runkoverkosta, kunhan ilmenneiden vikojen syyt saadaan selville.This master's thesis studies the distribution of IPTV channels from a core network to the edges of a MetroEthernet network. The goal is to find a faster solution for configuring multicast trees using protocols implemented by vendors. The current solution which uses Resource reSerVation Protocol for signalling MultiProtocol Label Switched tunnels, Internet Group Management Protocol Snooping for mapping receivers and Protocol Independent Multicast-Source Specific Multicast for core multicast creates too much work. The new solutions combine RSVP, point-to-multipoint RSVP, Fast ReRoute and PIM-SSM and they are tested in the TeliaSonera networking laboratory. Based on test results there is not much certainty about many things but it can be said that FRR seems to be working well and it is easy to use. Furthermore, P2MP RSVP seemed promising for the core network with faster convergence times in failure cases than PIM-SSM. However, there are few problems to be solved before the protocol is ready for use in the production network

    Xarxa mesh privada virtual

    Get PDF
    Aquest projecte ens apropa als conceptes com les xarxes privades virtuals, els serveis de seguretat (xifrar el tràfic, validar la integritat, autentificar els extrems, evitar el repudi i evitar la repetició) i les aplicacions distribuïdes (peer to peer). Avui en dia, la funció de permetre la unió de diferents ordenadors o xarxes locals en una nova xarxa virtual, pot ser aprofitada per poder abstraure’s de les barreres imposades per IPv4 com la limitació d’adreçament públic. El fet d’afegir la component de privacitat permet forçar un entorn segur, de confiança i independent del que puguin aportar les aplicacions. El conjunt de la creació de xarxes virtuals amb la component de privacitat permet la creació de xarxes privades virtuals també anomenades VPNs. L’objectiu d’aquest projecte és dissenyar i implementar una aplicació capaç de crear xarxes privades virtuals que no depenguin de cap servidor central, sense que això comprometi la privacitat ni l’autenticació dels integrants de la xarxa. L’aplicació ha de ser capaç de superar els Routers NAT (que tradueixen les adreces IP permetent compartir una adreça pública entre diferents ordenadors) per tal d’establir connexions bidireccionals directament amb els veïns de la xarxa virtual, proporcionant així una baixa latència. En fer els tests inicials es va trobar un problema relacionat amb la implementació de la llibreria OpenSSL del protocol segur utilitzat. Aquest error es presenta malgrat que aparentment l’aplicació fa un bon ús d’aquesta llibreria. Aquest problema ha consumit molt temps de dedicació del projecte sense poder ser solucionat. Com a resultats dels tests de l’aplicació creada en comparació amb les de les altres aplicacions existents: aquesta realitza una inicialització breu, te una latència baixa juntament amb una desviació estàndard molt baixa i permet taxes de transferència altes en TCP i baixes en UDP. Aquest document comença amb una introducció a les xarxes privades virtuals i al projecte.Seguidament, en el primer capítol s’exposa la descripció i la comparativa de les tecnologies de xarxes privades virtuals existents. En el segon s’explica el funcionament, el disseny i l’arquitectura de l’aplicació creada. En el tercer es presenten els resultats de les proves realitzades amb l’aplicació creada. I finalment hi ha les conclusions, la bibliografia i el glossari

    1937-1938 Xavier University College of Liberal Arts and Sciences Course Catalog

    Get PDF
    https://www.exhibit.xavier.edu/coursecatalog/1234/thumbnail.jp

    Consolidation of Customized Product Copies into Software Product Lines

    Get PDF
    Copy-based customization is a widespread technique to serve individual customer needs with existing software solutions. To cope with long term disadvantages resulting from this practice, this dissertation developed an approach to support the consolidation of such copies into a Software Product Line with a future-compliant product base providing managed variability

    Carinus Nursing College : an historical study of nursing education and management using the general systems approach, 1947-1987

    Get PDF
    The purpose of this dissertation is to research aspects of the historical development of Nursing Education and Nursing Management at the Carinus Nursing College from 1949 to 1987; to determine and explain how the College has adapted and coped with historical change and to determine whether proposals for the future can be made. Research has been done by applying the general systems theory and by using the standard methods of historical analysis. Data has been collected by means of oral history, literature search and documentation. The variables isolated are the College as a system; the government or influential super systems; resources such as financial, personnel and students and material inputs; and throughput or processing the work in the output, which leads to the professional nurse. The models used are Bucheles' organizational system, Sharma's flow chart pattern, Mintzberg's parts of organizational systems, and power flows and as shown in Emery, Feibleman and Friends relations and rules of interaction in systems thinking. Parsons' "imperatives of maintenance of a system" as well as Alvin Toffler's "second and third wave phenomena as responses to change" were two further models that were used. By using Robert Buchele's model, the work is divided into four parts: - i) the College as a system ii) the super systems iii) the resources iv) the throughput or processing. A further design that emerged was that two eras could be distinguished, within which three historical phases: - Early, Middle and Late are developed

    Bowdoin Orient v.95, no.1-34 (1965-1966)

    Get PDF
    https://digitalcommons.bowdoin.edu/bowdoinorient-1960s/1006/thumbnail.jp

    A VPRN Solution for Fully Secure and Efficient Group Communications

    Get PDF
    In this paper we show how to build a fully secure and efficient group communication service between several sites. This service is built on top of a VPN environment where IPSec tunnels are created, on-demand, between the various sites that need to communicate. This paper is a follow-up of previous work on group communications in a VPN environment and on application-level multicast. We show that these proposals naturally fit with one-another and lead to the concept of Virtual Private Routed Network, or VPRN. This concept enables us to largely improve the data distribution efficiency, and in particular reduces the physical link stress. We are convinced that security is critical in many situations and must be the primary concern of a group communication service
    corecore