1 Emphasizing 5G System Measurements Ingrid Moerman, Pieter Becue (iMinds)

Slides:



Advertisements
Similar presentations
Inter WISP WLAN roaming
Advertisements

1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill.
UMA (Unlicensed Mobile Access) El Ayoubi Ahmed Hjiaj Karim.
ITIS 3110 Jason Watson. Replication methods o Primary/Backup o Master/Slave o Multi-master Load-balancing methods o DNS Round-Robin o Reverse Proxy.
FOSS4G 2009 Building Human Sensor Webs with 52° North SWE Implementations Building Human Sensor Webs with 52° North SWE Implementations Eike Hinderk Jürrens,
Module CSY3021 Network Planning and Programming RD-CSY /09 1.
Wireless Design for Voice Last Update Copyright 2011 Kenneth M. Chipps Ph.D.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Lab/Tutorial 8 Lab/Tutorial 4 CHAN Chor Wah, Chester NG Chun Yu, Kenneth KONG Chi Wai, Kenny Cheung Man Chun, Vincent
Hands-On Microsoft Windows Server 2003 Networking Chapter 7 Windows Internet Naming Service.
DAKNET Presented By: rreema.
7DS Seven Degrees of Separation Suman Srinivasan IRT Lab Columbia University.
Maintaining and Updating Windows Server 2008
NetMotion Wireless Get Connected. Stay Connected..
Cellular IP: Proxy Service Reference: “Incorporating proxy services into wide area cellular IP networks”; Zhimei Jiang; Li Fung Chang; Kim, B.J.J.; Leung,
TCP Behavior across Multihop Wireless Networks and the Wired Internet Kaixin Xu, Sang Bae, Mario Gerla, Sungwook Lee Computer Science Department University.
1 Enabling Secure Internet Access with ISA Server.
Network Topologies.
© 2009 AT&T Intellectual Property. All rights reserved. Multimedia content growth: From IP networks to Medianets Cisco-IEEE ComSoc Webinar. Sept. 23, 2009.
© Siemens 2006 All Rights Reserved 1 Challenges and Limitations in a Back-End Controlled SmartHome Thesis Work Presentation Niklas Salmela Supervisor:
Submission doc.: IEEE /1258r2 November 2012 Fang Xie (China Mobile)Slide 1 Operator Deployed WLAN for Cellular offload Date:
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
Dartmouth’s Wireless Network May 16, 2005 David W. Bourque.
Experimentation using FIRE Wireless testbed tools Nikos Makris University of Thessaly Testbed Interoperability Workshop – FIA 2014.
It is a device that is able to work on its own without the help of another device or the help of the internet. An example of a standalone device would.
DECT Data Applications Contents DECT Data Application Scenarios DECT Data Interoperability DECT Data Standards DECT Data Trends Conclusions.
MIMCom 2006: Deploying a campus area network for the University Teaching Hospital Lusaka – Zambia Midterm Presentation March 24th 2006 Project Team: Michael.
Can We Talk Now? A Prototype Intelligent Status Tracking System For Enterprises 13 th November 2009 Sidney Shek ( )
Mobile Networking Challenges1 5.6 Mobile Ad Hoc Networks  Ad hoc network does not have any preexisting centralized server nodes to perform packet routing,
PCC (Policy & Charging Control) for Broadband Networks.
1 Intelligent Control in Wireles Networks Ingrid Moerman (iMinds)
Multicast on Mikael Abrahamsson Deutsche Telekom Adrian Stephens (Slides 10-13) Intel Corporation.
Building Information Exchange with First Responders (BIEFR) David Holmberg, NIST June 11, 2009 Slides credit to Alan Vinh.
What’s New in Fireware v11.9.5
Lemonade Requirements for Server to Client Notifications draft-ietf-lemonade-server-to-client-notifications-00.txt S. H. Maes C. Wilson Lemonade Intermediate.
Planning and Implementing Multimedia Messaging Service (MMS) in General Packet Radio Service (GPRS) Network Master’s Thesis Presentation Student: Li Tan.
Bluesocket vWLAN Overview. Its ALL about n……
Data and Computer Communications Ninth Edition by William Stallings Chapter 17 – Wireless LANs.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
Doc.: IEEE /1202r1 Submission October 2004 C. Wright, Azimuth SystemsSlide 1 Proposed Metrics for TGT and Call to Action Date: Oct 21, 2004 Author:
Maintaining and Updating Windows Server Monitoring Windows Server It is important to monitor your Server system to make sure it is running smoothly.
WiMAX at the University of Wisconsin-Madison A Programmable Facility for Experimentation with Wireless Heterogeneity and Wide-area Mobility.
Developing an Effective Wireless Middleware Strategy.
An Efficient Wireless Mesh Network A New Architecture 指導教授:許子衡 教授 學生:王志嘉.
SOCIAL HOUSEKEEPING THROUGH INTERCOMMUNICATING APPLIANCES AND SHARED RECIPES MERGING IN A PERVASIVE WEB-SERVICES INFRASTRUCTURE WP8 – Tests Ghent CREW.
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks Sergio Marti, T.J. Giuli, Kevin.
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
WiMAX Worldwide Interoperability for Microwave Access AMIT KUMAR AMIT KUMAR M TECH (ECE) M TECH (ECE)
Roadmap to Next Generation Internet: Indian Initiatives Subbu C-DAC, India.
QoS in Mobile IP by Preethi Tiwari Chaitanya Deshpande.
Smart Card based Location Tracking System By Saltriver Infosystems.
NMT’s Computer Science and Engineering Education & Research Programs Dr. Lorie M. Liebrock Chair, Computer Science and Engineering.
Networking Components Assignment 3 Corbin Watkins.
Resolve today’s IT management dilemma Enable generalist operators to localize user perceptible connectivity problems Raise alerts prioritized by the amount.
Maintaining and Updating Windows Server 2008 Lesson 8.
Model: DS-600 5x 10/100/1000Mbps Ethernet Port Centralized WLAN management and Access Point Discovery Manages up to 50 APs with access setting control.
Resource Allocation in Mobile Cloud Computing. Motivation ›Apart from offloading, resource provisioning has emerged to be an important issue. › Resource.
Introduction to “Tap – Dance ”. Company Proprietary Presentation Topics  Introduction  Handover scenarios  Inter-Network Handover consequences  Common.
Overview Issues in Mobile Databases – Data management – Transaction management Mobile Databases and Information Retrieval.
Barracuda Link Balancer
Architecture and Algorithms for an IEEE 802
OptiView™ XG Network Analysis Tablet
Optical-Based Switching Solutions
Web Caching? Web Caching:.
Phase 4: Plan your infrastructure for scale
w-iLab.t Zwijnaarde Pieter Becue Vincent Sercu 29/12/2018.
Multi hop connections using
Multi hop connections using
Multi hop connections using
Presentation transcript:

1 Emphasizing 5G System Measurements Ingrid Moerman, Pieter Becue (iMinds)

2 Emphasizing Wireless System Measurements Ingrid Moerman, Pieter Becue (iMinds)

3 Wired vs Wireless Measurements Connection to database server WiredWireless High available bandwidthLimited available bandwidth Connection is always availableConnection might be unstable (e.g. mobile units moving out of reach of AP) No interference(Unpredictable) wireless interference Lots of wireless measurement traffic might destroy other wireless networks

4 Control over “When” & “What” “When” : Control the time Ability to cache measurements If connection is unavailable If measurements generate too much traffic & interfere with solution under test “What” : Prioritize Critical measurements are sent in real-time Small reports (e.g. alerts) Non-critical measurements Periodic summary reports can be sent to server Detailed measurements can be off-loaded to server later

5 Enabling tools: OML Central database server Client applications

6 Enabling tools: OML Proxy server Central database server Client applications

7 OML Proxy Server states Measurements are cached by local OML server

8 OML Proxy Server states Measurements are forwarded to central server

9 Mobile w-iLab.t

10 Mobile w-iLab.t 1.Start of experiment: applications are started (robot is in docking station) 2.OML-proxy-server is paused: caching of measurements on robot 3.Robot is undocked and drives a path (defined by the user) 4.Robot returns to docking station and measurements are dumped to central OML server

11 Measurements in portable testbed DUT Wired Backbone Wireless Experiment DUT Continuous measurents over Ethernet backbone

12 DUT Wireless Backbone Wireless Experiment DUT Measurements can saturate the backbone Measurements in portable testbed

13 DUT Wireless Backbone Wireless Experiment DUT Backbone Control Measurements in portable testbed

14 Start/Stop dumping of measurements to server Traffic shaping Critical measurements are sent instantaneously Non-critical measurements can be cached Unless e.g. temperature measurements exceed a certain treshold Periodic reports can be sent to database server Contain aggregated data (Min/Max/Avg/ or other…) Used as status update for experimenter/administrator Shut down DUT if misbehaving E.g. when Wireless experiment interferes heavily with backbone Backbone Control

15 Conclusion Wireless measurements (in testbed) need extra control need traffic shaping caching prioritisation data aggregation wireless backbone: out of band Similar concept can be applied in 5G networks traffic shaping integrated in DUT CHALLENGE: inband versus out-of-band control

THANK YOU FOR YOUR TIME

? Questions