Vision for Network Softwarization and Security
- Betge-Brezetz S.
- Dietrich C.
- Dotaro E.
- Wary J.
This extended abstract introduces an overview of security challenges introduced by the evolution towards a new ICT generation based on IT and networks convergence using Virtualization and Software Defined approaches.
Multi-Connectivity Functional Architectures in 5G
- Aziz D.
- Bakker H.
This contribution will be the part of a full IEEE ICC 2016 conference paper with the above title which will be submitted under the EU-Funded 5G-NORMA consortium. On behalf of ALU, we contribute in 5G-NORMA research project on the topic of Multi-Connectivity with a focus on the integration of mmWave ...
A wavelength tunable ONU transmitter based on multi-mode Fabry-Perot laser and micro-ring resonator for bandwidth symmetric TWDM-PON
- Gao Z.
- Sun X.
- Zhang K.
Wavelength tunable optical transmitter is an essential component for the newly standardized time and wavelength division multiplexed passive optical network (TWDM-PON), where tunable ONU with 10Gb/s bit rate is desired to provide 40Gb/s symmetric bandwidth. In this paper, a novel wavelength tunable optical transmitter is proposed by reusing legacy low ...
C-RAN fronthaul enhancements using Software Defined Networking
- Aravinthan G.
- Boviz D.
- Roullet L.
Cloud Radio Access Networks (C-RAN) offer numerous advantages both on the functional and the hardware plane. We can efficiently control the access network using Software Defined Networking, but it is not the only benefit of SDN technology. Optimization of various network features and elements can be done by plug-and-play applications ...
Where Mobile Meets Cloud - Journey to 5G with vRAN / NFV
- Reinink K.
- Segel J.
- Urie A.
This chart set describes the role of virtualization and NFV in effecting the transition from VRAN 4G LTE to 5G; 5G will bring a broad range of new services at various capability, price, cost and performance points with a focus on end-to-end services and flexible personalization. New technologies such as ...
Flexible Data Plane for Zero Trust Security in Data Centers and Its Instantiation using ONOS Intent Framework
- Chang H.
- Lakshman T.
- Mukherjee S.
- Wang L.
Zero Trust security in a data center requires that every entity (VMs, hosts, users, etc.) within the data center is protected from one another through strict traffic scrutiny. Current solutions enforce this by controlling the reachability of traffic in and out of any entity. However, the security functions must be ...
Energy Consumption Aspects of Cache-Empowered Heterogeneous Networks: Optimization and Analysis
- Conte A.
- Perabathini B.
This paper presents an theorethical analysis of the energy consumption of caching strategies when applied to heterogeneous networks. The mathemathical analysis is based on stochastic geometry.
Heterogeneous Massive MIMO with Small Cells
- Marzetta T.
- Yang H.
A heterogeneous network with Massive MIMO and small cells can achieve even higher spectral and energy efficiency than a Massive MIMO alone. The performance of such heterogeneous system is examined in this paper. A few small cells are used to enhance the spectral and energy efficiency of the overall system. ...
Detecting and predicting outages in cellular networks
- Falk E.
- Gurbani V.
- Kushnir D.
- Mendiratta V.
- Phadke C.
- State R.
Modern cellular networks are complex systems offering a wide range of services and present challenges in detecting anomalous events when they do occur. The networks are engineered for high re- liability and, hence, the data from these networks is predominantly normal with a small proportion being anomalous. Froman operations perspective, ...
D 2.1 - Requirements and concepts for the analogue HW in 5G mobile systems
- Ferling D.
This document is a report of the European project Flex5Gware. The contributions of Alcatel-Lucent are included in the sections 2.1.1, 2.2, 3.1, and 3.3. They are no further authors involved in this contribution. Executive summary: This document comprises an analysis of requirements and envisaged concepts for RF front-ends and antennas ...
Targets, design rules and first designs for the 5G access network
- Mayer H.
The slide set gives an overview on high level targets, design rules and first solution for the 5G access network. For presentation in VDE ( German electrical engineering association)
UNIVERSELF - The end of needy networks
- Ciavaglia L.
Self-organised. Self-managing. Self-aware. Sounds a lot like you? Maybe so, but with the help of EU-funded research, it may also increasingly describe telecom networks. The autonomic systems of the future wont need us to keep them on track. They will spot and even anticipate glitches and sort them out faster ...
A framework for component certification in autonomic systems
- Ciavaglia L.
- Sander Spek
- Vânia Gonçalves
While theory on software certification exists (e.g., see  for an overview), little of it has been applied to autonomic systems in the context of Network Management Systems. In this paper, a framework will be provided for component certification for autonomous networks. It has been applied in the UniverSelf Project, ...
Globally Convergent Algorithms for Blind Source Separation
- Papadias C.
We present a nobel class of adaptive algorithms for the blind separataion of non-Gaussian mutually independent source signals that can be modeled as independent identically distributed (i.i.d) discrete random processes. The signals are assumed to be transmitted through a m x p narrow-band (instantaneous linear mixture) channel. The original algorithm, ...
SIP message prioritization and its applications
- Batteram H.
- Meeuwissen E.
- Van Bemmel J.
Session Initiation Protocol (SIP) signaling is an integral part of the IP Multimedia Subsystem (IMS) to support services such as Voice over IP (VoIP), multimedia sessions, presence, and instant messaging (IM). All of these services share a common SIP signaling infrastructure. In spite of careful network engineering, SIP network elements ...
XStream: a Functional Language for Distributed Stream Processing in the Edge Cloud
- Cortes M.
- Dobbelaere P.
- Hoste L.
- Philips E.
- Roelands M.
- Sheykh Esmaili K.
- Trappeniers L.
- Van Cutsem T.
- Van Raemdonck W.
- Verdot V.
Internet of Things (IoT) data and video traffic is forecasted to explode within the coming decade. Characteristic of such streams is that they are highly context-dependent and rarely consumed by humans. Traditional "big data" architectures are a bad fit for intelligently processing this large variety of streams as they usually ...
Social fingerprinting: detection of spambot groups through DNA-inspired behavioral modeling
- Cresci S.
- Di Pietro R.
- Petrocchi M.
- Spognardi A.
- Tesconi M.
Spambot detection in online social networks is a long-lasting challenge involving the study and design of detection techniques capable of efficiently identifying ever-evolving spammers. Recently, a new wave of social spambots has emerged, with advanced human-like characteristics that allow them to go undetected even by current state-of-the-art algorithms. In this ...
Microservices and docker: from theory to practice
- Janssens N.
- Van Cutsem T.
The document is a slide deck containing lecture material for a 1.5 hour session introducing the audience to the concepts of Microservices and Docker technology. Intended audience are software developers or software architects with a general software engineering background but no specific prior notion of microservices or docker. We use ...
A Novel PCS Lane Management Mechanism For High-Speed Ethernet
- Chen Y.
- Liu D.
In high-speed Ethernet such as 40G/100G Base-R, multiple PCS lanes are used usually to transport data. When any lane cannot be synchronized or aligned, traffic will be broken and this greatly wastes datawidth. A Novel PCS Lane Management Mechanism For High-Speed Ethernet is presented here. This mechanism can ensure data ...
reCloud: Towards Reliable Application Deployment in Cloud
- Akkus I.
- Chen R.
- Hilt V.
- Rimac I.
- Viswanath B.
We propose reCloud (dubbed for reliable cloud), a novel cloud reliability framework. It incorporates any pieces of dependency information about a data center that is available to the cloud provider. Such information includes, for instance, the configuration and the states of the hosts, switches, power supplies and cooling systems, as ...