7,113 research outputs found
Will SDN be part of 5G?
For many, this is no longer a valid question and the case is considered
settled with SDN/NFV (Software Defined Networking/Network Function
Virtualization) providing the inevitable innovation enablers solving many
outstanding management issues regarding 5G. However, given the monumental task
of softwarization of radio access network (RAN) while 5G is just around the
corner and some companies have started unveiling their 5G equipment already,
the concern is very realistic that we may only see some point solutions
involving SDN technology instead of a fully SDN-enabled RAN. This survey paper
identifies all important obstacles in the way and looks at the state of the art
of the relevant solutions. This survey is different from the previous surveys
on SDN-based RAN as it focuses on the salient problems and discusses solutions
proposed within and outside SDN literature. Our main focus is on fronthaul,
backward compatibility, supposedly disruptive nature of SDN deployment,
business cases and monetization of SDN related upgrades, latency of general
purpose processors (GPP), and additional security vulnerabilities,
softwarization brings along to the RAN. We have also provided a summary of the
architectural developments in SDN-based RAN landscape as not all work can be
covered under the focused issues. This paper provides a comprehensive survey on
the state of the art of SDN-based RAN and clearly points out the gaps in the
technology.Comment: 33 pages, 10 figure
Fixed-Mobile Convergence in the 5G era: From Hybrid Access to Converged Core
The availability of different paths to communicate to a user or device
introduces several benefits, from boosting enduser performance to improving
network utilization. Hybrid access is a first step in enabling convergence of
mobile and fixed networks, however, despite traffic optimization, this approach
is limited as fixed and mobile are still two separate core networks
inter-connected through an aggregation point. On the road to 5G networks, the
design trend is moving towards an aggregated network, where different access
technologies share a common anchor point in the core. This enables further
network optimization in addition to hybrid access, examples are userspecific
policies for aggregation and improved traffic balancing across different
accesses according to user, network, and service context. This paper aims to
discuss the ongoing work around hybrid access and network convergence by
Broadband Forum and 3GPP. We present some testbed results on hybrid access and
analyze some primary performance indicators such as achievable data rates, link
utilization for aggregated traffic and session setup latency. We finally
discuss the future directions for network convergence to enable future
scenarios with enhanced configuration capabilities for fixed and mobile
convergence.Comment: to appear in IEEE Networ
Mesmerizer: A Effective Tool for a Complete Peer-to-Peer Software Development Life-cycle
In this paper we present what are, in our experience, the best
practices in Peer-To-Peer(P2P) application development and
how we combined them in a middleware platform called Mesmerizer. We explain how simulation is an integral part of
the development process and not just an assessment tool.
We then present our component-based event-driven framework for P2P application development, which can be used
to execute multiple instances of the same application in a
strictly controlled manner over an emulated network layer
for simulation/testing, or a single application in a concurrent
environment for deployment purpose. We highlight modeling aspects that are of critical importance for designing and
testing P2P applications, e.g. the emulation of Network Address Translation and bandwidth dynamics. We show how
our simulator scales when emulating low-level bandwidth
characteristics of thousands of concurrent peers while preserving a good degree of accuracy compared to a packet-level
simulator
Toward Third Generation Internet Desktop Grids
Projects like SETI@home and Folding@home have popularized Internet Desktop Grid (IDG) computing. The first generation of IDG projects scalled to millions of participatings but was dedicated to a specific application. BOINC, United Device and XtremWeb belong to a second generation of IDG platforms. Their architecture was designed to accommodate many applications but has drawbacks like limited security and a centralized architecture. In this paper we present a new design for Internet Desktop Grid, following a layered approach. The new architecture establishes an overlay network, giving the participating nodes direct communication capabilities. From that basis many key mechanisms of IDG can be implemented using existing cluster tools and extra IDG specificic software. As a proof of concept, we run a bioinformatic application on a third generation IDG, based on a connectivity service (PVC), an existing job scheduler (Condor), a high performance data transport service (Bittorent) and a custom result certification mechanism
Development of a Multi-Objective Evolutionary Algorithm for Strain-Enhanced Quantum Cascade Lasers
An automated design approach using an evolutionary algorithm for the development of quantum cascade lasers (QCLs) is presented. Our algorithmic approach merges computational intelligence techniques with the physics of device structures, representing a design methodology that reduces experimental effort and costs. The algorithm was developed to produce QCLs with a three-well, diagonal-transition active region and a five-well injector region. Specifically, we applied this technique to AlxGa1xAs/InyGa1yAs strained active region designs. The algorithmic approach is a non-dominated sorting method using four aggregate objectives: target wavelength, population inversion via longitudinal-optical (LO) phonon extraction, injector level coupling, and an optical gain metric. Analysis indicates that the most plausible device candidates are a result of the optical gain metric and a total aggregate of all objectives. However, design limitations exist in many of the resulting candidates, indicating need for additional objective criteria and parameter limits to improve the application of this and other evolutionary algorithm methods
IPv6 Network Mobility
Network Authentication, Authorization, and Accounting has
been used since before the days of the Internet as we know it
today. Authentication asks the question, “Who or what are
you?” Authorization asks, “What are you allowed to do?” And fi nally,
accounting wants to know, “What did you do?” These fundamental
security building blocks are being used in expanded ways today. The
fi rst part of this two-part series focused on the overall concepts of
AAA, the elements involved in AAA communications, and highlevel
approaches to achieving specifi c AAA goals. It was published in
IPJ Volume 10, No. 1[0]. This second part of the series discusses the
protocols involved, specifi c applications of AAA, and considerations
for the future of AAA
Integration of a distributed Hadoop system into the infrastructure of a technology startup company
The article reviews the problems and methods of combining big data processing work in a fully distributed mode of operation into the infrastructure of a technology startup company. In this direction, the methods of integrating an external distributed Hadoop system (cluster) are described in more detail. These methods are connected to the operating scenarios for infrastructure integration. The problems with traffic and latency are reviewed. A plan of the process of implementation and operation of a distributed Hadoop system is presented with the steps and indicative term. The goal it reaches is a suitable system for operational work on projects in a technology startup company. Then, it is connected to a list of measures in the different stages in a startup company's work. The problems with operational management of the teamwork with flexible methodology and system administration are listed, discussed and solutions proposed
- …