Conference Paper

Vertical Industries Requirements Analysis & Targeted KPIs for Advanced 5G Trials

Authors:
  • Hellenic Telecommunications Organization (OTE S.A.)
To read the full-text of this research, you can request a copy directly from the authors.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... Building and maintaining a strong value network is crucial for new businesses to obtain resources, create strategic alliances, and take advantage of market opportunities (Pantano et al., 2019;Shen et al., 2020;Sutanto et al., 2024). Start-ups can improve their competitive posture, speed up growth, and provide long-term value for stakeholders by skillfully utilizing their value network (Doukoglou et al., 2019;Huang et al., 2019). ...
... Building and utilizing a strong value network is essential for new businesses to have access to capital, expertise, and joint venture opportunities. According to research by (Browne, 2021;Carvalho & Galina, 2015;Doukoglou et al., 2019), companies with large and diversified networks are better positioned to attain sustainable competitive advantage and market success. This study also indicates the favorable impact of value network configuration on the performance of start-ups. ...
Article
Value networks, industry experience, and innovation are some of the elements that impact the performance of start-up enterprises in Indonesia. Using a survey of 200 start-up founders, executives, and stakeholders, this quantitative study seeks to investigate the connections between these variables and start-up performance with SEM-PLS version 4. The results show a strong positive correlation between start-up performance, industry experience, value network, and innovation. In particular, start-ups with broad and varied networks, seasoned business owners, and an innovative culture typically see increases in revenue growth, market share, profitability, and customer satisfaction. The findings highlight how crucial it is to support innovation-driven projects, cultivate strategic alliances, and invest in human capital to increase start-up success in Indonesia. These conclusions have ramifications for business owners, financiers, decision-makers, and professionals in the field who aim to steer clear of the unstable terrain of the Indonesian startup scene and stimulate economic expansion via innovation and entrepreneurship. The real implications of this study emphasize the need for targeted policy measures and strategic investments that foster a conducive environment for innovation, enhance networking opportunities, and leverage industry expertise. These efforts can significantly contribute to the robustness and competitiveness of Indonesian start-ups, driving sustainable economic growth and development.
... 5G verticals need a seamless infrastructure that is able to support a vast amount of information, high throughput and low latency per case, wide area coverage that could extend from the premises of a factory, up to different countries, and handover capabilities, where mobility exists [11]. The infrastructure capabilities of a single MNO, or a federation of MNOs with limited lifecycle management (LCM) functionalities, cannot meet the 5G vertical requirements. ...
... On the other hand, in the hop-based heuristic algorithm, the iteration refers to the checks if a host is suitable for hosting the VNF. This sequence refers to the nested for loop in line 5 of Alg. 1, and the sequence of commands in this loop (i.e., lines [6][7][8][9][10][11][12][13][14][15][16]. A significant difference is that the optimal solution calculates the deployment cost of a VNF at all hosts and then selects the minimum cost based on the constraints. ...
Preprint
Full-text available
Service providers highly rely on network softwariza-tion for addressing the demanding use cases of the 5G verticals. In order for the 5G vertical scenarios to be seamlessly executed, where the coverage should be provided in large areas, the required infrastructure capacity and availability can only be supported by cross-operator cooperation. In this context, we employ a novel federated core-edge 5G architecture, where 5G vertical services are represented as service function chains (SFCs) and can be offered on the infrastructure owned either by the local operator or a foreign one. Furthermore, we propose two online SFC placement methods that aim to efficiently place the SFCs across the architecture, taking into account the deployment cost. A simulation of the optimal solution, based on an integer linear programming (ILP) approach, is evaluated against a hop-based heuristic placement method that runs on our experimental 5G platform. Our experimental results demonstrate that the optimized placement produces the most cost-effective solution. Our heuristic algorithm introduces a near-optimal solution, but with a higher deployment cost. Compared with the ILP approach, the heuristic solution provides lower complexity and execution time. Finally, in order to further augment the placement techniques, we propose enhanced lifecycle management methods that use live migration and scaling actions to further decrease the execution cost and adapt to real-time incoming traffic, respectively.
... The availability of 5G network is 99.999% or higher [41]. Furthermore, 5G is expected to support a connection density of up to 1,000,000 devices/km 2 , which is equivalent to 1 device/m 2 . ...
... A 5G system supports long-range coverage of up to 100 km [43]. The reliability of the network is 99.999% or higher [41]. Figure 4 compares 4G and 5G according to the performance characteristics of communication technologies for production defined by [24]. ...
Article
Full-text available
The fifth generation of mobile communication (5G) is expected to bring immense benefits to automated guided vehicles by improving existing respectively enabling 5G-distinctive network control systems, leading to higher productivity and safety. However, only 1% of production companies have fully deployed 5G yet. Most companies currently lack an understanding of return on investment and of technical use-case benefits. Therefore, this paper analyses the influence of 5G on an automated guided vehicle use case based on a five-step evaluation model. The analysis is conducted with a use case in the Digital Experience Factory in Aachen. It shows a difference of net present value between 4G and 5G of 1.3 M€ after 10 years and a difference of return of investment of 66%. Furthermore, analysis shows an increase of mobility (13%), productivity (20%) and safety (136%). This indicates a noticeable improvement of a 5G-controlled automated guided vehicle compared to a 4G-controlled automated guided vehicle.
... The 5G use cases are classified in terms of requirements for different types of communication. One of the use cases is enhanced mobile broadband (eMBB) which needs to support high bandwidth and high throughput [1], [2]. Furthermore, according to a Cisco forecast, demand for wireless data is expected to reach 77 exabytes per month and online video will make up 82% of internet traffic in 2022 [3], [4]. ...
... We analyzed the computational complexity of the proposed algorithm using big O notation 1 ...
Article
Full-text available
We propose a load balancing algorithm for a multi-RAT (radio access technology) network including a non-terrestrial network (NTN) and a terrestrial network (TN). Fifth generation (5G) and beyond-5G networks consider NTNs to provide connectivity and data delivery to large numbers of user equipments (UEs). However, previous load balancing algorithms do not consider the coexistence of NTNs and TNs and ignore the different resource allocation units in a multi-RAT network. Hence, we define a radio resource utilization ratio (RRUR) as a common load metric to measure the cell load of each RAT and employ an adaptive threshold to determine overloaded cells. The proposed algorithm consists of two steps to overcome the uneven load distribution across 5G cells: intra-RAT load balancing and inter-RAT load balancing. Based on the RRUR of a cell, the algorithm first performs intra-RAT load balancing by offloading the appropriate edge UEs of an overloaded cell to underutilized neighboring cells. If the RRUR of the cell is still higher than a predefined threshold, then inter-RAT load balancing is performed by offloading the delay-tolerant data flows of UEs to a satellite link. Furthermore, the algorithm estimates the impact of moving loads to the target cell load to avoid unnecessary load balancing actions. Simulation results show that the proposed algorithm not only distributes the load across terrestrial cells more evenly but also increases network throughput and the number of quality of service satisfied UEs more than previous load balancing algorithms.
... In certain power system protection applications, it is required that communication latency should be less than 10 ms [11]. 5G aims to provide low latency of up to 1 ms along with connectivity of 100,000 devices/km2 in a single cell, and reliability of 99.999% which means 5.26 minutes of downtime per year or 25.9 seconds per month [12]. ...
Conference Paper
Full-text available
A smart grid is an advanced electricity network enabled by IoT, ICT, and advanced grid technologies. 5G and beyond networks are expected to serve as the communication infrastructure of smart grids, providing intelligence, virtualization,and connectivity for millions of devices. This paper investigates the potential of 5G communication infrastructure for smart grids,specifically in the protection of smart grids. We evaluate the communication performance of 5G SA and NSA in a protection scenario, where a UE acting as an IED simulates R-GOOSE and R-SV packets and transmits them over the 5G network. We test the 5G network latency, packet loss, and jitter to evaluate its performance. By visualizing and computing the R-GOOSE and R-SV traffic it is observed that the latency of the majority of packets was 12-15 ms in SA and 20-45 ms in NSA.
... This technique ensures that critical services remain operational, even during security incidents or disruptions. In the papers [22][23][24], the security aspect of 5G networks is not fully covered. ...
Article
Full-text available
It is clear that 5G networks have already become integral to our present. However, a significant issue lies in the fact that current 5G communication systems are incapable of fully ensuring the required quality of service and the security of transmitted data, especially in government networks that operate in the context of the Internet of Things, hostilities, hybrid warfare, and cyberwarfare. The use of 5G extends to critical infrastructure operators and special users such as law enforcement, governments, and the military. Adapting modern cellular networks to meet the specific needs of these special users is not only feasible but also necessary. In doing so, these networks must meet additional stringent requirements for reliability, performance, and, most importantly, data security. This scientific paper is dedicated to addressing the challenges associated with ensuring cybersecurity in this context. To effectively improve or ensure a sufficient level of cybersecurity, it is essential to measure the primary indicators of the effectiveness of the security system. At the moment, there are no comprehensive lists of these key indicators that require priority monitoring. Therefore, this article first analyzed the existing similar indicators and presented a list of them, which will make it possible to continuously monitor the state of cybersecurity systems of 5G cellular networks with the aim of using them for groups of special users. Based on this list of cybersecurity KPIs, as a result, this article presents a model to identify and evaluate these indicators. To develop this model, we comprehensively analyzed potential groups of performance indicators, selected the most relevant ones, and introduced a mathematical framework for their quantitative assessment. Furthermore, as part of our research efforts, we proposed enhancements to the core of the 4G/5G network. These enhancements enable data collection and statistical analysis through specialized sensors and existing servers, contributing to improved cybersecurity within these networks. Thus, the approach proposed in the article opens up an opportunity for continuous monitoring and, accordingly, improving the performance indicators of cybersecurity systems, which in turn makes it possible to use them for the maintenance of critical infrastructure and other users whose service presents increased requirements for cybersecurity systems.
... The T&L sector is a major component of modern production and distributed systems, as it significantly contributes to the macroeconomic development [3]. However, processes in the T&L industry suffer from insufficient automation and optimization, which highly affects efficiency and safety of the T&L operations. ...
Conference Paper
By delivering end-to-end latencies down to 5ms, data rates of up to 20Gbps, and ultra-high reliability of 99.999%, 5G is extending the capabilities of numerous industry verticals, including the Transport & Logistics (T&L). As the T&L industry has a pivotal role in modern production and distribution systems, it is expected to leverage 5G technology to significantly increase efficiency and safety in the T\&L operations, through automating and optimizing processes and resource usage. However, to be able to truly benefit from 5G, the design, the development, as well as the management, of T\&L services need to specify and include 5G connectivity requirements, and the features that are tailored to the specific T\&L use cases. To this end, in this paper we introduce the concept of Network Applications (NetApps), as the fundamental building blocks of T\&L services in 5G, which simplify the composition of complex services, abstracting the underlying complexity and bridging the knowledge gap between the vertical stakeholders, the network experts, and the application/service providers, while specifying service-level information (vertical specific) and 5G requirements (5G slices and 5G Core services). In this paper, we exemplify the concept of NetApps leveraging one of the VITAL-5G use cases, which provides faster and safer operations of vessels in the port of Galati, the largest port on the Danube River.
... For example, in [10], the authors present three novel Cooperated, Connected, and Automated Mobility (CCAM) use cases in a cross-border setting, running on top of the 5G communication infrastructures connecting three neighbouring cities. Apart from illustrative examples of the envisaged applications, a suitable set of metrics, target requirements, and KPIs has also been investigated, along with the enabling technologies needed for meeting these more stringent conditions [8][9][10][11][12]. As a representative example, an Artificial Intelligence (AI)-driven automated 5G end-to-end slicing solution for supporting multiple vertical services is introduced in [13]. The proposed AI-enabled closed-loop for service management is able to assure Service Level Agreement (SLA) compliance by incorporating features such as an automated Radio Access Network (RAN) orchestration and control and the multi-domain aggregation of services and resources from different providers. ...
Article
Full-text available
The ongoing transition towards 5G technology expedites the emergence of a variety of mobile applications that pertain to different vertical industries. Delivering on the key commitment of 5G, these diverse service streams, along with their distinct requirements, should be facilitated under the same unified network infrastructure. Consequently, in order to unleash the benefits brought by 5G technology, a holistic approach towards the requirement analysis and the design, development, and evaluation of multiple concurrent vertical services should be followed. In this paper, we focus on the Transport vertical industry, and we study four novel vehicular service categories, each one consisting of one or more related specific scenarios, within the framework of the “5G Health, Aquaculture and Transport (5G-HEART)” 5G PPP ICT-19 (Phase 3) project. In contrast to the majority of the literature, we provide a holistic overview of the overall life-cycle management required for the realization of the examined vehicular use cases. This comprises the definition and analysis of the network Key Performance Indicators (KPIs) resulting from high-level user requirements and their interpretation in terms of the underlying network infrastructure tasked with meeting their conflicting or converging needs. Our approach is complemented by the experimental investigation of the real unified 5G pilot’s characteristics that enable the delivery of the considered vehicular services and the initial trialling results that verify the effectiveness and feasibility of the presented theoretical analysis.
... The new fifth generation of wireless communications (5G) aims to deal with the technical limits of 4G. It provides a significant improvement in the perceived QoS to users compared to the current 4G LTE network and, more importantly, opens new perspectives for the vertical industry [14]. ...
Thesis
Full-text available
The current architecture “one size fits all” of 4G network cannot support the next-generation 5G heterogeneous services criteria. Therefore, research around 5G aims to provide more adequate architectures and mechanisms to deal with this purpose. The 5G architecture is envisioned to accommodate the diverse and conflicting demands of services in terms of latency, bandwidth, and reliability, which cannot be sustained by the same network infrastructure. In this context, network slicing provided by network virtualization allows the infrastructure to be divided into different slices. Each slice is tailored to meet specific service requirements allowing different services (such as automotive, Internet of Things, etc.) to be provided by different network slice instances. Each of these instances consists of a set of virtual network functions that run on the same infrastructure with specially adapted orchestration. Three main service classes of network slicing have been defined by the researchers as follows: Enhanced Mobile Broadband (eMBB), massive Machine Type Communication (mMTC), and ultra-Reliable and Low-Latency Communication (uRLLC). One of the main challenges when it comes to deploying Network Slices is slicing the Radio Access Network (RAN). Indeed, managing RAN resources and sharing them among Network Slices is an increasingly difficult task, which needs to be properly designed. This thesis proposes solutions that aim to improve network performance, and introduce flexibility and greater utilization of network resources by accurately and dynamically provisioning the activated network slices with the appropriate amounts of resources to meet their diverse requirements.
... Fifth-generation (5G) and future 5G+ systems are going to present a driving force for industrial changes. [1][2][3][4] The 5G is intended to shape and foster industries such as automotive, healthcare, energy, smart cities, media, and entertainment. Moreover, optical wireless communications (OWCs) are envisioned to be included in 5G and beyond 5G communication networks. ...
Article
Full-text available
This article investigates outage statistics of double gamma–gamma random variable (RV) modeled as the product of two independent and identically distributed gamma–gamma RVs. The outage closed‐form statistics in terms of the first‐order statistical measures (probability density function and cumulative distribution function) and the second‐order statistical measures (level crossing rate and average fade duration) by Laplace approximation integral (LAI) and exponential LAI are derived. The statistical results are directly related to the performance evaluation of dual‐hop as well as cooperative dual‐hop optical wireless communications over moderate to strong turbulence‐induced fading channels.
... Moreover, the 5G verticals [6] coexisting in such a new network ecosystem require specific security services, individually configured security functions implemented on different network planes and layers, and flexible deployment procedures; see, e.g., [7]. To provide adequate network functionalities for a vertical, one can use the standardized types of 5G networks, e.g., suitable for realtime and other Fixed Wireless Access (FWA) services, the enhanced Mobile Broadband (eMBB), which needs to support large payloads and high bandwidth and which can use to the greatest extent the protection offer of edge devices [8], Ultra-Reliable and Low-Latency Communication (URLLC), which supports use cases with very low latency for services that require short response times, or massive Machine Type Communication (mMTC) for Machine-to-Machine (M2M), which should support many devices in a base station, see [9], [10]. The expected values of the 5G network quality parameters of these types of networks, drawing on the scale of all expected maximal values of the quality parameters of IMT-2020 for 5th generation networks, are presented according to ITU-R M.2083 [11], see Fig. 1. ...
Article
Full-text available
5G is the fifth-generation cellular network satisfying the requirements IMT-2020 (International Mobile Telecommunications-2020) of the International Telecommunication Union. Mobile network operators started using it worldwide in 2019. Generally, 5G achieves exceptionally high values of performance parameters of access and transmission. The application of edge servers facilitated the implementation of such requirements of 5G, which resulted in 5G MEC (Multi-access Edge Computing) technology. Moreover, to optimize services for specific business applications, the concept of 5G vertical industries has been proposed. In this paper, we study how the application of the MEC technology affects the functioning of 5G MEC-based services. We consider twelve representative vertical industries of 5G MEC by presenting their essential characteristics, threats, vulnerabilities, and known attacks. Next, we analyze their functional properties, give efficiency patterns and identify the effect of applying the MEC technology in 5G on the resultant network’s quality parameters to identify the expected security requirements. Finally, we identify the impact of classified threats on the 5G empowered vertical industries and identify the most sensitive cases to focus on their protection against network attacks in the first place.
... 5 G networks need to support services with stringent latency, availability, and capacity requirements by connecting endusers to the data center (DC) locations where the application servers (ASs) (responsible for executing the service-specific applications) are deployed [1]. In this regard, there is a need for service provisioning strategies that assure meeting service requirements while using radio, connectivity, and compute resources efficiently. ...
Article
Full-text available
We address a key challenge of 5G networks by proposing a strategy for the resource-efficient and end-to-end allocation of compute and connectivity resources in a dynamic 5G service provisioning scenario, such that the service latency and availability requirements are guaranteed. Our heuristic algorithm shows that resource efficiency is significantly improved by processing services in the large core data centers (DCs) with a rich amount of compute resources and exploiting the benefits of traffic grooming over the metro and core fiber links. Moreover, our resource-efficient provisioning algorithm avoids possible violation of the service availability requirements caused by reaching the central DC locations by adding backup connectivity resources. Our simulation results demonstrate a resource efficiency improvement reflected by lowering the service blocking probability by up to four orders of magnitude compared to the conventional service provisioning methods utilizing distributed small DCs.
... The fifth generation (5G) of mobile and wireless communications will constitute a distributed intelligent communications, sensing, and computing platform. To support this vision of 5G and be an actor of its evolution, the 5G-EVE 1 european project is building an end-to-end facility composed of four interconnected sites located in Greece, Italy, Spain and France [1]. Each site is capable of handling the requirements of various use cases brought by verticals and proposes 5G solution elements that will be deployed and implemented. ...
Poster
Full-text available
In this paper we present a 5G design and deployment framework within the 5G-EVE European project which aims at interconnecting multiple sites in order to form a single 5G end-to-end facility. Each partner of the project proposes 5G solution elements that will host use-cases brought by verticals. In this paper we present Plug'in as a design framework allowing different partners of the 5G-EVE project and verticals to create and test innovative components for 5G. We also present how components such as VNFs are on-boarded within 5G-EVE and finally we give a quick overview of a vertical's workflow.
Article
Full-text available
Cellular networks are projected to deal with an immense rise in data traffic, as well as an enormous and diverse device, plus advanced use cases, in the nearest future; hence, future 5G networks are being developed to consist of not only 5G but also different radio access technologies (RATs) integrated. In addition to 5G, the user's device (UD) will be able to connect to the network via LTE, WiMAX, WiFi, Satellite and other technologies. On the other hand, Satellite has been suggested as a preferred network to support 5G use cases. However, achieving load balancing is essential to guarantee an equal amount of traffic distributed between different RATs in a heterogeneous wireless network; this would enable optimal utilisation of the radio resources and lower the likelihood of call blocking/dropping. This study presented an artificial intelligent‐based application in heterogeneous wireless networks and proposed an enhanced particle optimisation (EPSO) algorithm to solve the load balancing problem in 5G‐Satellite networks. The algorithm uses a call admission control strategy to admit users into the network to ensure that users are evenly distributed on the network. The proposed algorithm was compared with the Artificial Bee Colony and Simulated Annealing algorithm using three performance metrics: throughput, call blocking and fairness. Finally, based on the experimental findings, results outcomes were analysed and discussed.
Article
Full-text available
As mobile communications transform, 5G technology can potentially change many industries and businesses. The change will have a great influence across many fields, such as the automotive, healthcare, and manufacturing sectors. This paper aims to review the existing applications of blockchain technology in providing 5G network security and identify new possibilities for such security solutions. We consider different aspects of blockchain in 5G, particularly data transmission, access control, and applications including vertical industry-oriented applications and specific solutions supporting such sectors of economic activity. The paper briefly describes modern technologies in 5G networks and introduces blockchain’s properties and different aspects of using such technology in practical applications. It also presents access control management with blockchain applied in 5G and related problems, reviews other blockchain-enforced network technologies, and shows how blockchain can help in services dedicated to vertical industries. Finally, it presents our vision of new blockchain applications in modern 5G networks and beyond. The new-generation networks use two fundamental technologies, slicing and virtualization, and attackers attempt to execute new types of attacks on them. In the paper, we discuss one of the possible scenarios exhibiting the shortcomings of the slicing technology architecture. We propose using blockchain technology to create new slices and to connect new or existing subscribers to slices in the 5G core network. Blockchain technology should solve these architectural shortcomings.
Chapter
The Fifth-Generation Mobile Networks (5G) contribute to the growth of mobile applications and services and the increase of connected Internet of Things (IoT) devices by providing an infrastructure for upcoming necessities. One of the crucial scenarios in 5G and IoT is the Internet of Healthcare Things (IoHT), where many unexplored services emerge to improve the patient’s quality of life. However, there are challenges for infrastructure requirements to support data traffic growth while promoting a reduction in energy usage. Edge Computing (EC) and Network Slicing (NS) are two supporting paradigms for data-intensive and low-latency applications that enable the host of virtualized resources in 5G. However, the arrangement of computing resources in different levels and nodes is a critical challenge, followed by constraints, requirements, and performance goals. Furthermore, since IoHT applications present demanding necessities regarding latency and throughput, such as high-quality video streaming, virtual and augmented reality, computer vision, and intelligent signal processing, the adoption of application placement strategies is essential to improve the performance of these services. This chapter presents a review of EC and NS in the context of IoHT for 5G.KeywordsFifth-Generation Mobile Networks (5G)Edge Computing (EC)Network Slicing (NS)Internet of Healthcare Things (IoHT)Healthcare
Article
Full-text available
This paper focuses on the security challenges of network slice implementation in 5G networks. We propose that network slice controllers support security by enabling security controls at different network layers. The slice controller orchestrates multilevel domains with resources at a very high level but needs to understand how to define the resources at lower levels. In this context, the main outstanding security challenge is the compromise of several resources in the presence of an attack due to weak resource isolation at different levels. We analysed the current standards and trends directed to mitigate the vulnerabilities mentioned above, and we propose security controls and classify them by efficiency and applicability (easiness to develop). Security controls are a common way to secure networks, but they enforce security policies only in respective areas. Therefore, the security domains allow for structuring the orchestration principles by considering the necessary security controls to be applied. This approach is common for both vendor-neutral and vendor-dependent security solutions. In our classification, we considered the controls in the following fields: (i) fair resource allocation with dynamic security assurance, (ii) isolation in a multilayer architecture and (iii) response to DDoS attacks without service and security degradation.
Article
The arrival of 5G paves the way for the deployment of the so-called Industry 4.0, which is a new paradigm devoted to the digital transformation of manufacturing and factory production. Because of the resources required to perform this transformation, the importance of field trials and experimentation cannot be overstated, both to support the design of novel methodologies and to validate these designs. In this article, we leverage the 5G EVE end-to-end open platform to design and validate a novel operation approach for automated guided vehicles (AGVs). This use case consists of the placement of the intelligence that controls the AGV in a remote entity. This movement could improve and simplify the operation of industrial processes. The customizability of the 5G validation platform proves fundamental to evaluate the solution under different deployment architectures and to assess its performance under hazardous radio conditions. Our results demonstrate the ability of 5G to handle latency-constrained use cases with superior performance compared to the current state-of-the-art mobile technology.
Article
By massively digitalizing production processes, industries expect efficient and secure cooperation of a large number of machines, as well as increasing control and services in edge clouds. Their vision calls for a distributed, converged datacom and telecom infrastructure where performance, can be deterministic per application, i.e. strictly guaranteed, end-to-end, across technologies and across layers. Its success will largely depend on how dynamically it can reuse resources and how cost-effectively it can host mainstream best-effort applications. In this paper, we review the key performance indicators for such an infrastructure while confronting them to thirty use cases reported by industries. We then examine the requirements for the digital infrastructure. We benchmark them against the capabilities of relevant network technologies, while pointing to meaningful enhancements. We particularly discuss Time-Sensitive Networking (TSN), a set of standards extending IEEE 802.1 Ethernet with some deterministic functions, which is considered to be the most promising enabling technology for future industrial networks. We propose to augment its scalability with a novel optical backbone which can interconnect islands of TSN networks while preserving timing.
Conference Paper
Full-text available
In a global concerted effort, the networking community is defining 5G as the next generation networking infrastructure. New in the approach is the focus on the requirements of the vertical sectors. The salient characteristic of these sectors is that they are rapidly becoming open ecosystems built on top of common infrastructures. This requires a high degree of technological convergence among vertical industries empowering them with technical capacity and triggering the development of new, innovative products, applications and services. On the technology side, 5G is adopting new concepts and developments such as virtualization at all levels of the infrastructure enabling the 5G network infrastructure to become a key asset of the emerging common environment for technical and business innovation in the vertical sectors. In order to answer the questions "How holistic and unified such an environment can be?", and "How an infrastructure can satisfy and reconcile competing requirements of the vertical sectors?", we present the concept and approach of 5GINFIRE, a project that is tasked to build and operate an open, and extensible 5G NFV-based reference ecosystem of experimental facilities, laying down the foundations for a fully software controlled instantiation of virtual networks meeting the requirements of the vertical sectors.
Article
The Cloud infrastructure and its extensive set of Internet-accessible resources has potential to provide significant benefits to robots and automation systems. We consider robots and automation systems that rely on data or code from a network to support their operation, i.e., where not all sensing, computation, and memory is integrated into a standalone system. This survey is organized around four potential benefits of the Cloud: 1) Big Data: access to libraries of images, maps, trajectories, and descriptive data; 2) Cloud Computing: access to parallel grid computing on demand for statistical analysis, learning, and motion planning; 3) Collective Robot Learning: robots sharing trajectories, control policies, and outcomes; and 4) Human Computation: use of crowdsourcing to tap human skills for analyzing images and video, classification, learning, and error recovery. The Cloud can also improve robots and automation systems by providing access to: a) datasets, publications, models, benchmarks, and simulation tools; b) open competitions for designs and systems; and c) open-source software. This survey includes over 150 references on results and open challenges. A website with new developments and updates is available at: http://goldberg.berkeley.edu/cloud-robotics/
Technical (Non-Functional) Requirements: An Agile Introduction
  • Scott Ambler