Slice-aware Capacity Management in Multi-Tenant Networks

5G is envisioned to provide substantial increase in the network performance both in terms of achieved rate and delay. However, in order to satisfy these goals, the network operators are forced to make significant investments on the network infrastructure. Consequently a key question is how to invest the scarce economical ...

Comparing the Performance of State-of-the-Art Software Switches for NFV

Software switches are increasingly used in network function virtualization (NFV) to route traffic between virtualized network functions (VNFs) and physical network interface cards (NICs). Understanding of alternative switch designs remains deficient, however, in the absence of a comprehensive, comparative performance analysis. In this paper, we propose a methodology intended to ...

Smartphone Positioning with Radio Measurements Performed by a Single WiFi Access Point

Despite the large literature on localization, there is no solution yet to localize a commercial off-the-shelf smartphone device using radio measurements performed by a single WiFi AP. We present a single AP localization system that exploits Fine Time Measurements (FTM) and Angle of Arrival (AOA) extracted from commercial chipsets exploiting ...

Cooperative Digital Magnetic-Elevation Maps by Small Autonomous Aerial Robots

One of the steps to provide fundamental data for planning a mining effort is the magnetic surveying of a target area, which is typically carried out by conventional aircraft campaigns. However, besides the high cost, fixed-wing aerial vehicles present shortcomings especially for drape flights on mountainous regions, where steep slopes ...

Future edge clouds

Widespread deployment of centralized clouds has changed the way internet services are developed, deployed and operated. They have substantially extended the market opportunities for online services, enabled new entities to create and operate internet-scale services, and changed the way traditional companies run their operations. However, there are types of services ...

A Deep Reinforcement Learning Approach for VNF Forwarding Graph Embedding

Network Function Virtualization (NFV) and service orchestration simplify the deployment and management of network and telecommunication services. The deployment of these services requires, typically, the allocation of Virtual Network Function-Forwarding Graph (VNF-FG), which implies not only the fulfillment of the service's requirements in terms of Quality of Service (QoS), but ...

The Essential Guide to Realizing 5G-Connected UAVs with Massive MIMO

What will it take for drones -- and the whole associated ecosystem -- to take off? Arguably, infallible command and control (C&C) channels for safe and autonomous flying, and high-throughput links for multi-purpose live video streaming. And indeed, meeting these aspirations may entail a full cellular support, provided through 5G-and-beyond ...

Orthogonally coupled geometrical constraints in optics design

Modern optical multi-camera systems require integrating many camera modules in a small volume. A new space-saving concept for such imaging systems is presented, based on intersecting optical paths that utilize one or more common elements for the respective optical paths. The principles for the optimization for such systems is examined, ...

Dynamic In-band Self-backhauling for 5G Systems with Inter-cell Resource Coordination

© 2019, Springer Science+Business Media, LLC, part of Springer Nature. 5G systems are expected to utilize frequency bands above 6 GHz in the so-called millimeter-wave (mmWave) spectrum because of large bandwidths. It is well know that higher carrier frequency bands suffer from higher path loss attenuation. It addition, dynamic blockages ...

Machine Learning for Securing Industrial Networks

The next industrial revolution dubbed Industry 4.0 that is underway, holds the promise of greater automation and productivity but also introduces new security risks and threats to Industrial Control Systems from unsecured devices and machines. Connected devices suffer from vulnerabilities that have often been exploited, as in recent Mirai botnets, ...

Containers vs Virtual Machines: Choosing the Right Virtualization Technology for Mobile Edge Cloud

Mobile Edge Cloud (MEC) is paving the way for 5G networks in respective of latency and computation offloading. To support user mobility, MEC service should be migrated from one base station to another to remain in close proximity to users. Providing low migration time and downtime is one of the ...

Edge Cloud Deployment of Enterprise Communication

Demo decription of cognitive cloud control prototype to be shown at the Bell Labs Innovation Day in Stuttgart

Carbon handprint: Potential climate benefits of a novel liquid-cooled base station with waste heat reuse

The novel life cycle assessment (LCA)-based carbon handprint indicator represents a potential carbon footprint reduction that producers/products create for customers who use the(ir) product instead of a baseline product. The research question is how to consider a situation in which multiple customers use a product for different purposes to provide ...

SLIDING TIMER EXPIRY TO REPORT FAULTS TO ETHERNET RING PROTECTION MECHANISM

The G.8032 Ethernet Ring Protection (ERP) protocol, detects failure and au-tomatically switches traffic path. To avoid different race conditions and un-necessary switching operations, it uses different timers. One of the static tim-er configured today is Hold-off timer. After detecting a failure ERPS will not switch immediately, it will wait for ...

Practical Aspects of Microservice Architecture presented on Code::Dive Nokia organized IT conference

In the presentation I will focus on practical consequences affecting system and entity when applying certain solutions as a part of microservice architecture, each design brings benefits, limitations, and risks to the system. I treat each solution as a contract with the system, and I will describe what kind of ...

Making Fast Incremental Compiler for Huge Codebase

This presentation gives an overview of incremental compilation idea and specific algorithm used to compile huge TTCN-3 codebase (over 2 million lines of code compiled at once) in a very short time in order to reduce compiler feedback time and streamline work of TTCN-3 developers.

[LT] How bananas could save your project. Understanding UX

Imagine you are about to release your product. You find it brilliant and dazzling. Hitting the market! This is your child and you are so proud! So proud till the first wave of feedback comes. Oh, really? This is not what you have expected. Now you are confused, devastated. Not ...

Transmit power optimisation in cellular networks with nomadic base stations

© The Institution of Engineering and Technology 2019 The increasing demand for cellular network capacity can be mitigated through the installation of nomadic eNodeB, which serve a temporal increase of traffic volume in specific area. When nomadic cells are deployed, the transmission power of neighbour base stations needs to be ...