86 research outputs found

    Enhanced mobility management mechanisms for 5G networks

    Get PDF
    Many mechanisms that served the legacy networks till now, are being identified as being grossly sub-optimal for 5G networks. The reason being, the increased complexity of the 5G networks compared previous legacy systems. One such class of mechanisms, important for any wireless standard, is the Mobility Management (MM) mechanisms. MM mechanismsensure the seamless connectivity and continuity of service for a user when it moves away from the geographic location where it initially got attached to the network. In this thesis, we firstly present a detailed state of the art on MM mechanisms. Based on the 5G requirements as well as the initial discussions on Beyond 5G networks, we provision a gap analysis for the current technologies/solutions to satisfy the presented requirements. We also define the persistent challenges that exist concerning MM mechanisms for 5G and beyond networks. Based on these challenges, we define the potential solutions and a novel framework for the 5G and beyond MM mechanisms. This framework specifies a set of MM mechanisms at the access, core and the extreme edge network (users/devices) level, that will help to satisfy the requirements for the 5G and beyond MM mechanisms. Following this, we present an on demand MM service concept. Such an on-demand feature provisions the necessary reliability, scalability and flexibility to the MM mechanisms. It's objective is to ensure that appropriate resources and mobility contexts are defined for users who will have heterogeneous mobility profiles, versatile QoS requirements in a multi-RAT network. Next, in this thesis we tackle the problem of core network signaling that occurs during MM in 5G/4G networks. A novel handover signaling mechanism has been developed, which eliminates unnecessary handshakes during the handover preparation phase, while allowing the transition to future softwarized network architectures. We also provide a handover failure aware handover preparation phase signaling process. We then utilize operator data and a realistic network deployment to perform a comparative analysis of the proposed strategy and the 3GPP handover signaling strategy on a network wide deployment scenario. We show the benefits of our strategy in terms of latency of handover process, and the transmission and processing cost incurred. Lastly, a novel user association and resource allocation methodology, namely AURA-5G, has been proposed. AURA-5G addresses scenarios wherein applications with heterogeneous requirements, i.e., enhanced Mobile Broadband (eMBB) and massive Machine Type Communications (mMTC), are present simultaneously. Consequently, a joint optimization process for performing the user association and resource allocation while being cognizant of heterogeneous application requirements, has been performed. We capture the peculiarities of this important mobility management process through the various constraints, such as backhaul requirements, dual connectivity options, available access resources, minimum rate requirements, etc., that we have imposed on a Mixed Integer Linear Program (MILP). The objective function of this established MILP problem is to maximize the total network throughput of the eMBB users, while satisfying the minimum requirements of the mMTC and eMBB users defined in a given scenario. Through numerical evaluations we show that our approach outperforms the baseline user association scenario significantly. Moreover, we have presented a system fairness analysis, as well as a novel fidelity and computational complexity analysis for the same, which express the utility of our methodology given the myriad network scenarios.Muchos mecanismos que sirvieron en las redes actuales, se están identificando como extremadamente subóptimos para las redes 5G. Esto es debido a la mayor complejidad de las redes 5G. Un tipo de mecanismo importante para cualquier estándar inalámbrico, consiste en el mecanismo de gestión de la movilidad (MM). Los mecanismos MM aseguran la conectividad sin interrupciones y la continuidad del servicio para un usuario cuando éste se aleja de la ubicación geográfica donde inicialmente se conectó a la red. En esta tesis, presentamos, en primer lugar, un estado del arte detallado de los mecanismos MM. Bas ándonos en los requisitos de 5G, así como en las discusiones iniciales sobre las redes Beyond 5G, proporcionamos un análisis de las tecnologías/soluciones actuales para satisfacer los requisitos presentados. También definimos los desafíos persistentes que existen con respecto a los mecanismos MM para redes 5G y Beyond 5G. En base a estos desafíos, definimos las posibles soluciones y un marco novedoso para los mecanismos 5G y Beyond 5G de MM. Este marco especifica un conjunto de mecanismos MM a nivel de red acceso, red del núcleo y extremo de la red (usuarios/dispositivos), que ayudarán a satisfacer los requisitos para los mecanismos MM 5G y posteriores. A continuación, presentamos el concepto de servicio bajo demanda MM. Tal característica proporciona la confiabilidad, escalabilidad y flexibilidad necesarias para los mecanismos MM. Su objetivo es garantizar que se definan los recursos y contextos de movilidad adecuados para los usuarios que tendrán perfiles de movilidad heterogéneos, y requisitos de QoS versátiles en una red multi-RAT. Más adelante, abordamos el problema de la señalización de la red troncal que ocurre durante la gestión de la movilidad en redes 5G/4G. Se ha desarrollado un nuevo mecanismo de señalización de handover, que elimina los intercambios de mensajes innecesarios durante la fase de preparación del handover, al tiempo que permite la transición a futuras arquitecturas de red softwarizada. Utilizamos los datos de operadores y consideramos un despliegue de red realista para realizar un análisis comparativo de la estrategia propuesta y la estrategia de señalización de 3GPP. Mostramos los beneficios de nuestra estrategia en términos de latencia del proceso de handover y los costes de transmisión y procesado. Por último, se ha propuesto una nueva asociación de usuarios y una metodología de asignación de recursos, i.e, AURA-5G. AURA-5G aborda escenarios en los que las aplicaciones con requisitos heterogéneos, i.e., enhanced Mobile Broadband (eMBB) y massive Machine Type Communications (mMTC), están presentes simultáneamente. En consecuencia, se ha llevado a cabo un proceso de optimización conjunta para realizar la asociación de usuarios y la asignación de recursos mientras se tienen en cuenta los requisitos de aplicaciónes heterogéneas. Capturamos las peculiaridades de este importante proceso de gestión de la movilidad a través de las diversas restricciones impuestas, como son los requisitos de backhaul, las opciones de conectividad dual, los recursos de la red de acceso disponibles, los requisitos de velocidad mínima, etc., que hemos introducido en un Mixed Integer Linear Program (MILP). La función objetivo de este problema MILP es maximizar el rendimiento total de la red de los usuarios de eMBB, y a la vez satisfacer los requisitos mínimos de los usuarios de mMTC y eMBB definidos en un escenario dado. A través de evaluaciones numéricas, mostramos que nuestro enfoque supera significativamente el escenario de asociación de usuarios de referencia. Además, hemos presentado un análisis de la justicia del sistema, así como un novedoso análisis de fidelidad y complejidad computacional para el mismo, que expresa la utilidad de nuestra metodología

    Deliverable D2.1 - Ecosystem analysis and 6G-SANDBOX facility design

    Get PDF
    This document provides a comprehensive overview of the core aspects of the 6G-SANDBOX project. It outlines the project's vision, objectives, and the Key Performance Indicators (KPIs) and Key Value Indicators (KVIs) targeted for achievement. The functional and non-functional requirements of the 6G-SANDBOX Facility are extensively presented, based on a proposed reference blueprint. A detailed description of the updated reference architecture of the facility is provided, considering the requirements outlined. The document explores the experimentation framework, including the lifecycle of experiments and the methodology for validating KPIs and KVIs. It presents the key technologies and use case enablers towards 6G that will be offered within the trial networks. Each of the platforms constituting the 6G-SANDBOX Facility is described, along with the necessary enhancements to align them with the project's vision in terms of hardware, software updates, and functional improvements

    Enhanced mobility management mechanisms for 5G networks

    Get PDF
    Many mechanisms that served the legacy networks till now, are being identified as being grossly sub-optimal for 5G networks. The reason being, the increased complexity of the 5G networks compared previous legacy systems. One such class of mechanisms, important for any wireless standard, is the Mobility Management (MM) mechanisms. MM mechanismsensure the seamless connectivity and continuity of service for a user when it moves away from the geographic location where it initially got attached to the network. In this thesis, we firstly present a detailed state of the art on MM mechanisms. Based on the 5G requirements as well as the initial discussions on Beyond 5G networks, we provision a gap analysis for the current technologies/solutions to satisfy the presented requirements. We also define the persistent challenges that exist concerning MM mechanisms for 5G and beyond networks. Based on these challenges, we define the potential solutions and a novel framework for the 5G and beyond MM mechanisms. This framework specifies a set of MM mechanisms at the access, core and the extreme edge network (users/devices) level, that will help to satisfy the requirements for the 5G and beyond MM mechanisms. Following this, we present an on demand MM service concept. Such an on-demand feature provisions the necessary reliability, scalability and flexibility to the MM mechanisms. It's objective is to ensure that appropriate resources and mobility contexts are defined for users who will have heterogeneous mobility profiles, versatile QoS requirements in a multi-RAT network. Next, in this thesis we tackle the problem of core network signaling that occurs during MM in 5G/4G networks. A novel handover signaling mechanism has been developed, which eliminates unnecessary handshakes during the handover preparation phase, while allowing the transition to future softwarized network architectures. We also provide a handover failure aware handover preparation phase signaling process. We then utilize operator data and a realistic network deployment to perform a comparative analysis of the proposed strategy and the 3GPP handover signaling strategy on a network wide deployment scenario. We show the benefits of our strategy in terms of latency of handover process, and the transmission and processing cost incurred. Lastly, a novel user association and resource allocation methodology, namely AURA-5G, has been proposed. AURA-5G addresses scenarios wherein applications with heterogeneous requirements, i.e., enhanced Mobile Broadband (eMBB) and massive Machine Type Communications (mMTC), are present simultaneously. Consequently, a joint optimization process for performing the user association and resource allocation while being cognizant of heterogeneous application requirements, has been performed. We capture the peculiarities of this important mobility management process through the various constraints, such as backhaul requirements, dual connectivity options, available access resources, minimum rate requirements, etc., that we have imposed on a Mixed Integer Linear Program (MILP). The objective function of this established MILP problem is to maximize the total network throughput of the eMBB users, while satisfying the minimum requirements of the mMTC and eMBB users defined in a given scenario. Through numerical evaluations we show that our approach outperforms the baseline user association scenario significantly. Moreover, we have presented a system fairness analysis, as well as a novel fidelity and computational complexity analysis for the same, which express the utility of our methodology given the myriad network scenarios.Muchos mecanismos que sirvieron en las redes actuales, se están identificando como extremadamente subóptimos para las redes 5G. Esto es debido a la mayor complejidad de las redes 5G. Un tipo de mecanismo importante para cualquier estándar inalámbrico, consiste en el mecanismo de gestión de la movilidad (MM). Los mecanismos MM aseguran la conectividad sin interrupciones y la continuidad del servicio para un usuario cuando éste se aleja de la ubicación geográfica donde inicialmente se conectó a la red. En esta tesis, presentamos, en primer lugar, un estado del arte detallado de los mecanismos MM. Bas ándonos en los requisitos de 5G, así como en las discusiones iniciales sobre las redes Beyond 5G, proporcionamos un análisis de las tecnologías/soluciones actuales para satisfacer los requisitos presentados. También definimos los desafíos persistentes que existen con respecto a los mecanismos MM para redes 5G y Beyond 5G. En base a estos desafíos, definimos las posibles soluciones y un marco novedoso para los mecanismos 5G y Beyond 5G de MM. Este marco especifica un conjunto de mecanismos MM a nivel de red acceso, red del núcleo y extremo de la red (usuarios/dispositivos), que ayudarán a satisfacer los requisitos para los mecanismos MM 5G y posteriores. A continuación, presentamos el concepto de servicio bajo demanda MM. Tal característica proporciona la confiabilidad, escalabilidad y flexibilidad necesarias para los mecanismos MM. Su objetivo es garantizar que se definan los recursos y contextos de movilidad adecuados para los usuarios que tendrán perfiles de movilidad heterogéneos, y requisitos de QoS versátiles en una red multi-RAT. Más adelante, abordamos el problema de la señalización de la red troncal que ocurre durante la gestión de la movilidad en redes 5G/4G. Se ha desarrollado un nuevo mecanismo de señalización de handover, que elimina los intercambios de mensajes innecesarios durante la fase de preparación del handover, al tiempo que permite la transición a futuras arquitecturas de red softwarizada. Utilizamos los datos de operadores y consideramos un despliegue de red realista para realizar un análisis comparativo de la estrategia propuesta y la estrategia de señalización de 3GPP. Mostramos los beneficios de nuestra estrategia en términos de latencia del proceso de handover y los costes de transmisión y procesado. Por último, se ha propuesto una nueva asociación de usuarios y una metodología de asignación de recursos, i.e, AURA-5G. AURA-5G aborda escenarios en los que las aplicaciones con requisitos heterogéneos, i.e., enhanced Mobile Broadband (eMBB) y massive Machine Type Communications (mMTC), están presentes simultáneamente. En consecuencia, se ha llevado a cabo un proceso de optimización conjunta para realizar la asociación de usuarios y la asignación de recursos mientras se tienen en cuenta los requisitos de aplicaciónes heterogéneas. Capturamos las peculiaridades de este importante proceso de gestión de la movilidad a través de las diversas restricciones impuestas, como son los requisitos de backhaul, las opciones de conectividad dual, los recursos de la red de acceso disponibles, los requisitos de velocidad mínima, etc., que hemos introducido en un Mixed Integer Linear Program (MILP). La función objetivo de este problema MILP es maximizar el rendimiento total de la red de los usuarios de eMBB, y a la vez satisfacer los requisitos mínimos de los usuarios de mMTC y eMBB definidos en un escenario dado. A través de evaluaciones numéricas, mostramos que nuestro enfoque supera significativamente el escenario de asociación de usuarios de referencia. Además, hemos presentado un análisis de la justicia del sistema, así como un novedoso análisis de fidelidad y complejidad computacional para el mismo, que expresa la utilidad de nuestra metodología.Postprint (published version

    Recent Advances in Wireless Communications and Networks

    Get PDF
    This book focuses on the current hottest issues from the lowest layers to the upper layers of wireless communication networks and provides "real-time" research progress on these issues. The authors have made every effort to systematically organize the information on these topics to make it easily accessible to readers of any level. This book also maintains the balance between current research results and their theoretical support. In this book, a variety of novel techniques in wireless communications and networks are investigated. The authors attempt to present these topics in detail. Insightful and reader-friendly descriptions are presented to nourish readers of any level, from practicing and knowledgeable communication engineers to beginning or professional researchers. All interested readers can easily find noteworthy materials in much greater detail than in previous publications and in the references cited in these chapters

    Contributions to Desktop Grid Computing : From High Throughput Computing to Data-Intensive Sciences on Hybrid Distributed Computing Infrastructures

    Get PDF
    Since the mid 90’s, Desktop Grid Computing - i.e the idea of using a large number of remote PCs distributed on the Internet to execute large parallel applications - has proved to be an efficient paradigm to provide a large computational power at the fraction of the cost of a dedicated computing infrastructure.This document presents my contributions over the last decade to broaden the scope of Desktop Grid Computing. My research has followed three different directions. The first direction has established new methods to observe and characterize Desktop Grid resources and developed experimental platforms to test and validate our approach in conditions close to reality. The second line of research has focused on integrating Desk- top Grids in e-science Grid infrastructure (e.g. EGI), which requires to address many challenges such as security, scheduling, quality of service, and more. The third direction has investigated how to support large-scale data management and data intensive applica- tions on such infrastructures, including support for the new and emerging data-oriented programming models.This manuscript not only reports on the scientific achievements and the technologies developed to support our objectives, but also on the international collaborations and projects I have been involved in, as well as the scientific mentoring which motivates my candidature for the Habilitation `a Diriger les Recherches

    Abstracting Application Development for Resource Constrained Wireless Sensor Networks

    Get PDF
    Ubiquitous computing is a concept whereby computing is distributed across smart objects surrounding users, creating ambient intelligence. Ubiquitous applications use technologies such as the Internet, sensors, actuators, embedded computers, wireless communication, and new user interfaces. The Internet-of-Things (IoT) is one of the key concepts in the realization of ubiquitous computing, whereby smart objects communicate with each other and the Internet. Further, Wireless Sensor Networks (WSNs) are a sub-group of IoT technologies that consist of geographically distributed devices or nodes, capable of sensing and actuating the environment.WSNs typically contain tens to thousands of nodes that organize and operate autonomously to perform application-dependent sensing and sensor data processing tasks. The projected applications require nodes to be small in physical size and low-cost, and have a long lifetime with limited energy resources, while performing complex computing and communications tasks. As a result, WSNs are complex distributed systems that are constrained by communications, computing and energy resources. WSN functionality is dynamic according to the environment and application requirements. Dynamic multitasking, task distribution, task injection, and software updates are required in field experiments for possibly thousands of nodes functioning in harsh environments.The development of WSN application software requires the abstraction of computing, communication, data access, and heterogeneous sensor data sources to reduce the complexities. Abstractions enable the faster development of new applications with a better reuse of existing software, as applications are composed of high-level tasks that use the services provided by the devices to execute the application logic.The main research question of this thesis is: What abstractions are needed for application development for resource constrained WSNs? This thesis models WSN abstractions with three levels that build on top of each other: 1) node abstraction, 2) network abstraction, and 3) infrastructure abstraction. The node abstraction hides the details in the use of the sensing, communication, and processing hardware. The network abstraction specifies methods of discovering and accessing services, and distributing processing in the network. The infrastructure abstraction unifies different sensing technologies and infrastructure computing platforms.As a contribution, this thesis presents the abstraction model with a review of each abstraction level. Several designs for each of the levels are tested and verified with proofs of concept and analyses of field experiments. The resulting designs consist of an operating system kernel, a software update method, a data unification interface, and all abstraction levels combining abstraction called an embedded cloud.The presented operating system kernel has a scalable overhead and provides a programming approach similar to a desktop computer operating system with threads and processes. An over-the-air update method combines low overhead and robust software updating with application task dissemination. The data unification interface homogenizes the access to the data of heterogeneous sensor networks. A unification model is used for various use cases by mapping everything as measurements. The embedded cloud allows resource constrained WSNs to share services and data, and expand resources with other technologies. The embedded cloud allows the distributed processing of applications according to the available services. The applications are implemented as processes using a hardware independent description language that can be executed on resource constrained WSNs. The lessons of practical field experimenting are analyzed to study the importance of the abstractions. Software complexities encountered in the field experiments highlight the need for suitable abstractions.The results of this thesis are tested using proof of concept implementations on real WSN hardware which is constrained by computing power in the order of a few MIPS, memory sizes of a few kilobytes, and small sized batteries. The results will remain usable in the future, as the vast amount, tight integration, and low-cost of future IoT devices require the combination of complex computation with resource constrained platforms

    Kommunikation und Bildverarbeitung in der Automation

    Get PDF
    In diesem Open-Access-Tagungsband sind die besten Beiträge des 9. Jahreskolloquiums "Kommunikation in der Automation" (KommA 2018) und des 6. Jahreskolloquiums "Bildverarbeitung in der Automation" (BVAu 2018) enthalten. Die Kolloquien fanden am 20. und 21. November 2018 in der SmartFactoryOWL, einer gemeinsamen Einrichtung des Fraunhofer IOSB-INA und der Technischen Hochschule Ostwestfalen-Lippe statt. Die vorgestellten neuesten Forschungsergebnisse auf den Gebieten der industriellen Kommunikationstechnik und Bildverarbeitung erweitern den aktuellen Stand der Forschung und Technik. Die in den Beiträgen enthaltenen anschaulichen Beispiele aus dem Bereich der Automation setzen die Ergebnisse in den direkten Anwendungsbezug

    Demystifying Internet of Things Security

    Get PDF
    Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms
    corecore