9 research outputs found
Dataset Structural Index: Leveraging a machine's perspective towards visual data
With advances in vision and perception architectures, we have realized that
working with data is equally crucial, if not more, than the algorithms. Till
today, we have trained machines based on our knowledge and perspective of the
world. The entire concept of Dataset Structural Index(DSI) revolves around
understanding a machine`s perspective of the dataset. With DSI, I show two meta
values with which we can get more information over a visual dataset and use it
to optimize data, create better architectures, and have an ability to guess
which model would work best. These two values are the Variety contribution
ratio and Similarity matrix. In the paper, I show many applications of DSI, one
of which is how the same level of accuracy can be achieved with the same model
architectures trained over less amount of data
Improving the efficiency of spectral features extraction by structuring the audio files
The extraction of spectral features from a music clip is a computationally
expensive task. As in order to extract accurate features, we need to process
the clip for its whole length. This preprocessing task creates a large overhead
and also makes the extraction process slower. We show how formatting a dataset
in a certain way, can help make the process more efficient by eliminating the
need for processing the clip for its whole duration, and still extract the
features accurately. In addition, we discuss the possibility of defining set
generic durations for analyzing a certain type of music clip while training.
And in doing so we cut down the need of processing the clip duration to just
10% of the global average
DEFINING PROCEDURES AND AN INTERFACE BETWEEN A LOCAL NSACF AND A GLOBAL NSACF FOR EFFICIENT ADMISSION CONTROL
Presented herein are techniques that provide for defining an interface between one or more local network slice admission control functions (NSACFs) and a global or primary NSACF. Various techniques presented herein can help to report local events to a global NSACF and may also be useful for restoration procedures when a local NSACF restarts. Thus, techniques proposed herein can facilitate improved slice admission and control procedures over existing standards-based solutions
MECHANISM TO ENABLE POLICY DRIVEN ROUTE SELECTION IN 5GC AND EPC
In a Third Generation Partnership Project (3GPP) Fifth Generation (5G) core (5GC) network or in a Control and User Plane Separation (CUPS)-based Fourth Generation (4G) Evolved Packet Core (EPC) network, the control and data planes are separate. This allows for the user plane function to be deployed at the centralized datacenter (e.g., co-located with a Session Management Function (SMF) and/or a control plane System Architecture Evolution Gateway (SAEGW), at a remote datacenter (e.g., for a Mobile Edge Computing (MEC) implementation), or at customer premises (e.g., for an enterprise use-case). Such network implementations can increase network complexity as a network operator will need to provide efficient routing mechanisms to support the 5G use-cases, such as Enterprise 5G, Ultra-Reliable Low-Latency Communication (URLLC) flows, private 5G, low latency applications like gaming, etc. Techniques presented here provide for the ability to address these complexities by enabling dynamic selection of next-hop routes based on subscriber category/policy, user equipment (UE) location, the location/capabilities of User Plane Functions (UPFs), type of traffic/application, and/or UPF slice used
CONSUMER NF AUTHENTICATION AND SERVICE AUTHORIZATION USING AN SCP FOR AN ESBA BASED 5G CORE NETWORK
For a Third Generation Partnership Project (3GPP) Fifth Generation (5G) core (5GC) enhanced Service Based Architecture (eSBA) network, 3GPP Specifications identify a number of communication models. For example, the 3GPP specification 23.501 defines four communication models, encompassing direct and indirect modes, between a Consumer Network Function (NF) and a Producer NF. Within the indirect modes, a Service Communication Proxy (SCP) performs a range of important activities including among other things load balancing and load distribution of signaling traffic between for example different NF instances of a NF Set or different NF Services of a NF Service set. As a network scales and as traffic complexity grows, a range of challenges may arise encompassing excess or redundant signaling traffic, token invalidation, etc. Techniques are presented herein that address these challenges through the incorporation of an Open Authorization (OAuth) service into a SCP, yielding a number of improvements including, for example, a reduction in the overall number of signaling messages; significant optimization of the signaling between Consumer, SCP and NRF; simplification of the Auth call flow in scenarios where an initial producer instance is changed or multiple SCPs are deployed in a system; among others
AMF SELECTION AND SIGNALLING FOR AMF RECOVERY IN AN ENHANCED SERVICE-BASED ARCHITECTURE UTILIZING INDIRECT COMMUNICATIONS IN 5G NETWORKS
Access and Mobility Management Function (AMF) sets and regions, as defined in Release 15 of Third Generation Partnership Project (3GPP) standards, provide for the hierarchical organization of AMFs in which an AMF can belong to a set, and different AMF sets can belong to an AMF region. When an AMF fails, a peer can then search for an AMF in the same set, and if that fails, can then search for an AMF in the same region. 3GPP Release 16 standards introduced the indirect communications that can involve a Service Communication Proxy (SCP). However, the hierarchical discovery of an AMF by an SCP is not fully described in standards. Thus, when AMF reselection is performed through an SCP, information indicating that reselection has occurred and which old AMF was hosting certain user equipment (UE) is not send to the new AMF, which can lead to race conditions. Presented herein are techniques to address such issues through the incorporation of additional information that can be appended to messaging provided to an SCP that can allow the SCP to perform AMF reselection and send the additional information to a newly selected AMF, which allows the new AMF to detect and resolve such race conditions
TECHNIQUES TO AVOID UE REGISTRATION LOOPING DUE TO MULTIPLE AMF REDIRECTIONS
A service provider can deploy a 5G mobile core network by enabling network slices in order to offer different services to end users. In a network slicing deployment, a user equipment (UE) can initiate a registration procedure with a given Access and Mobility Management Function (AMF), however, an initial AMF with which a given UE initiates registration may not support the network slice with which UE seeks to register such that the UE is to be redirected to an appropriate AMF that serves the network slice. As there can be many different type of network slices provided for a 5G mobile core network, there can be many complexities and operational challenge with respect to configuring 5G core network nodes, such as AMFs, to serve all network slices that may be deployed for a network; thus, AMF redirects are likely to occur in many deployments. Proposed herein are techniques to facilitate efficient redirection to an AMF that serves a requested network slice. Further, techniques proposed herein may prevent deadlock conditions for UEs attempting to access network services/slices
CONVERGING SESSIONS OR DATA PATHS ON A USER PLANE
As mobile operators look to deploy Third Generation Partnership Project (3GPP) Fifth Generation (5G) services (either standalone (SA) or non-standalone (NSA)) to their subscribers, the process of migrating from Fourth Generation (4G) Evolved Packet Core (EPC) deployments to 5G core (5GC) is going to take time. During such a migration process the principal focus will be on providing higher throughputs and lower data path latency. It is likely that operators will have both EPC and 5GC deployments in their network for some time as they deploy a converged core – ‘ AnyG’ – and roll out nation-wide 5G coverage. This implies that a substantial number of subscribers may still be using the Evolved Universal Mobile Telecommunications System (UMTS) Terrestrial Radio Access Network (EUTRAN) and operators will see a large number of 5G to 4G handovers. With dual cores deployed in the network, the total cost of ownership for the operators will be high. Techniques are presented herein to address these challenges by enabling an operator to use a common user plane for Control and User Plane Separation of EPC nodes (CUPS), 5G NSA, and 5G SA deployments thus helping to reduce capital expenditures and operating expenses