An End-to-end Performance Analysis for Service Chaining in a Virtualized Network

Future mobile networks supporting Internet of Things are expected to provide both high throughput and low latency to user-specific services. One way to overcome this challenge is to adopt network function virtualization and Multi-access edge computing (MEC). Besides latency constraints, these services may have strict function chaining requirements. In other ...

Toward Theoretically Founded Learning-Based Compressed Sensing

© 1963-2012 IEEE. Noiseless compressed sensing refers to the problem of recovering a (high-dimensional) signal from its under-determined linear measurements. For compressed sensing to be feasible, the signal needs to be structured. While the main focus of the field has been on simple structures such as sparsity, there has been ...

Building a Truly Dynamic Filterless Metro Network by Reusing a Commercial PON's Data-Plane and a Novel SDN-Enabled Control-Plane

© 1983-2012 IEEE. The migration of DataCenters into Metropolitan Area Networks creates new challenges which include the need for rapid service provisioning and recovery and new, cost-effective, connectivity schemes. Here we propose and demonstrate a truly dynamic transportation platform tailored for a metro network. The novelty of the proposed architecture ...

Quantifying the Gain of Dynamic Network Slicing under Critical Constraints

By providing high flexibility and abstraction of network resources and functions, network slicing allows to partition a single physical infrastructure in multiple logical independent networks, called slices. To guarantee the required network performances, slices need to be logically isolated from each other. Therefore, advanced mechanisms are needed to efficiently manage ...

Slice-aware Capacity Management in Multi-Tenant Networks

5G is envisioned to provide substantial increase in the network performance both in terms of achieved rate and delay. However, in order to satisfy these goals, the network operators are forced to make significant investments on the network infrastructure. Consequently a key question is how to invest the scarce economical ...

Comparing the Performance of State-of-the-Art Software Switches for NFV

Software switches are increasingly used in network function virtualization (NFV) to route traffic between virtualized network functions (VNFs) and physical network interface cards (NICs). Understanding of alternative switch designs remains deficient, however, in the absence of a comprehensive, comparative performance analysis. In this paper, we propose a methodology intended to ...

Smartphone Positioning with Radio Measurements Performed by a Single WiFi Access Point

Despite the large literature on localization, there is no solution yet to localize a commercial off-the-shelf smartphone device using radio measurements performed by a single WiFi AP. We present a single AP localization system that exploits Fine Time Measurements (FTM) and Angle of Arrival (AOA) extracted from commercial chipsets exploiting ...

Cooperative Digital Magnetic-Elevation Maps by Small Autonomous Aerial Robots

One of the steps to provide fundamental data for planning a mining effort is the magnetic surveying of a target area, which is typically carried out by conventional aircraft campaigns. However, besides the high cost, fixed-wing aerial vehicles present shortcomings especially for drape flights on mountainous regions, where steep slopes ...

Future edge clouds

Widespread deployment of centralized clouds has changed the way internet services are developed, deployed and operated. They have substantially extended the market opportunities for online services, enabled new entities to create and operate internet-scale services, and changed the way traditional companies run their operations. However, there are types of services ...

A Deep Reinforcement Learning Approach for VNF Forwarding Graph Embedding

Network Function Virtualization (NFV) and service orchestration simplify the deployment and management of network and telecommunication services. The deployment of these services requires, typically, the allocation of Virtual Network Function-Forwarding Graph (VNF-FG), which implies not only the fulfillment of the service's requirements in terms of Quality of Service (QoS), but ...

The Essential Guide to Realizing 5G-Connected UAVs with Massive MIMO

What will it take for drones -- and the whole associated ecosystem -- to take off? Arguably, infallible command and control (C&C) channels for safe and autonomous flying, and high-throughput links for multi-purpose live video streaming. And indeed, meeting these aspirations may entail a full cellular support, provided through 5G-and-beyond ...

Orthogonally coupled geometrical constraints in optics design

Modern optical multi-camera systems require integrating many camera modules in a small volume. A new space-saving concept for such imaging systems is presented, based on intersecting optical paths that utilize one or more common elements for the respective optical paths. The principles for the optimization for such systems is examined, ...

Dynamic In-band Self-backhauling for 5G Systems with Inter-cell Resource Coordination

© 2019, Springer Science+Business Media, LLC, part of Springer Nature. 5G systems are expected to utilize frequency bands above 6 GHz in the so-called millimeter-wave (mmWave) spectrum because of large bandwidths. It is well know that higher carrier frequency bands suffer from higher path loss attenuation. It addition, dynamic blockages ...

Containers vs Virtual Machines: Choosing the Right Virtualization Technology for Mobile Edge Cloud

Mobile Edge Cloud (MEC) is paving the way for 5G networks in respective of latency and computation offloading. To support user mobility, MEC service should be migrated from one base station to another to remain in close proximity to users. Providing low migration time and downtime is one of the ...

Carbon handprint: Potential climate benefits of a novel liquid-cooled base station with waste heat reuse

The novel life cycle assessment (LCA)-based carbon handprint indicator represents a potential carbon footprint reduction that producers/products create for customers who use the(ir) product instead of a baseline product. The research question is how to consider a situation in which multiple customers use a product for different purposes to provide ...

SLIDING TIMER EXPIRY TO REPORT FAULTS TO ETHERNET RING PROTECTION MECHANISM

The G.8032 Ethernet Ring Protection (ERP) protocol, detects failure and au-tomatically switches traffic path. To avoid different race conditions and un-necessary switching operations, it uses different timers. One of the static tim-er configured today is Hold-off timer. After detecting a failure ERPS will not switch immediately, it will wait for ...

Practical Aspects of Microservice Architecture presented on Code::Dive Nokia organized IT conference

In the presentation I will focus on practical consequences affecting system and entity when applying certain solutions as a part of microservice architecture, each design brings benefits, limitations, and risks to the system. I treat each solution as a contract with the system, and I will describe what kind of ...

[LT] How bananas could save your project. Understanding UX

Imagine you are about to release your product. You find it brilliant and dazzling. Hitting the market! This is your child and you are so proud! So proud till the first wave of feedback comes. Oh, really? This is not what you have expected. Now you are confused, devastated. Not ...