100% found this document useful (7 votes)
69 views53 pages

Computing in Communication Networks: From Theory To Practice 1st Edition Frank Fitzek Instant Download

The document provides information about the book 'Computing in Communication Networks: From Theory to Practice' edited by Frank Fitzek and others, detailing its content and structure. It includes chapters on future communication networks, standardization, network slicing, mobile edge cloud, and enabling technologies. Additionally, it offers links to download various related academic texts and emphasizes the importance of relying on personal experience and knowledge in applying the information presented.

Uploaded by

ucwejcmrv252
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (7 votes)
69 views53 pages

Computing in Communication Networks: From Theory To Practice 1st Edition Frank Fitzek Instant Download

The document provides information about the book 'Computing in Communication Networks: From Theory to Practice' edited by Frank Fitzek and others, detailing its content and structure. It includes chapters on future communication networks, standardization, network slicing, mobile edge cloud, and enabling technologies. Additionally, it offers links to download various related academic texts and emphasizes the importance of relying on personal experience and knowledge in applying the information presented.

Uploaded by

ucwejcmrv252
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 53

Computing in Communication Networks: From Theory

to Practice 1st Edition Frank Fitzek pdf


download

https://textbookfull.com/product/computing-in-communication-
networks-from-theory-to-practice-1st-edition-frank-fitzek/

Download more ebook instantly today - get yours now at textbookfull.com


We believe these products will be a great fit for you. Click
the link to download now, or visit textbookfull.com
to discover even more!

Forensic Communication in Theory and Practice 1st


Edition Coll

https://textbookfull.com/product/forensic-communication-in-
theory-and-practice-1st-edition-coll/

Structures of Computing: A Guide to Practice-Oriented


Theory 1st Edition Egon Börger

https://textbookfull.com/product/structures-of-computing-a-guide-
to-practice-oriented-theory-1st-edition-egon-borger/

Machine Learning in Finance: From Theory to Practice


Matthew F. Dixon

https://textbookfull.com/product/machine-learning-in-finance-
from-theory-to-practice-matthew-f-dixon/

C from Theory to Practice George S. Tselikis

https://textbookfull.com/product/c-from-theory-to-practice-
george-s-tselikis/
Research Methods: From Theory to Practice Ben Gorvine

https://textbookfull.com/product/research-methods-from-theory-to-
practice-ben-gorvine/

Serious Games in Physical Rehabilitation: From Theory


to Practice 1st Edition Bruno Bonnechère (Auth.)

https://textbookfull.com/product/serious-games-in-physical-
rehabilitation-from-theory-to-practice-1st-edition-bruno-
bonnechere-auth/

Artificial Intelligence in Medical Imaging-From Theory


to Clinical Practice 1st Edition Lia Morra (Author)

https://textbookfull.com/product/artificial-intelligence-in-
medical-imaging-from-theory-to-clinical-practice-1st-edition-lia-
morra-author/

Contemporary Feminist Research from Theory to Practice


Patricia Leavy

https://textbookfull.com/product/contemporary-feminist-research-
from-theory-to-practice-patricia-leavy/

Occupational Health Ethics From Theory to Practice


Jacques Tamin

https://textbookfull.com/product/occupational-health-ethics-from-
theory-to-practice-jacques-tamin/
Computing in
Communication
Networks
From Theory to Practice
Computing in
Communication
Networks
From Theory to Practice

Edited by
Frank H.P. Fitzek
Technische Universität Dresden
Dresden, Germany

Fabrizio Granelli
University of Trento
Trento, Italy

Patrick Seeling
Central Michigan University
Mount Pleasant, MI, United States
Academic Press is an imprint of Elsevier
125 London Wall, London EC2Y 5AS, United Kingdom
525 B Street, Suite 1650, San Diego, CA 92101, United States
50 Hampshire Street, 5th Floor, Cambridge, MA 02139, United States
The Boulevard, Langford Lane, Kidlington, Oxford OX5 1GB, United Kingdom
Copyright © 2021 Elsevier Inc. All rights reserved.
No part of this publication may be reproduced or transmitted in any form or by any means, electronic
or mechanical, including photocopying, recording, or any information storage and retrieval system,
without permission in writing from the publisher. Details on how to seek permission, further
information about the Publisher’s permissions policies and our arrangements with organizations such
as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website:
www.elsevier.com/permissions.
This book and the individual contributions contained in it are protected under copyright by the
Publisher (other than as may be noted herein).
Notices
Knowledge and best practice in this field are constantly changing. As new research and experience
broaden our understanding, changes in research methods, professional practices, or medical treatment
may become necessary.
Practitioners and researchers must always rely on their own experience and knowledge in evaluating
and using any information, methods, compounds, or experiments described herein. In using such
information or methods they should be mindful of their own safety and the safety of others, including
parties for whom they have a professional responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume
any liability for any injury and/or damage to persons or property as a matter of products liability,
negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas
contained in the material herein.

Library of Congress Cataloging-in-Publication Data


A catalog record for this book is available from the Library of Congress

British Library Cataloguing-in-Publication Data


A catalogue record for this book is available from the British Library

ISBN: 978-0-12-820488-7

For information on all Academic Press publications


visit our website at https://www.elsevier.com/books-and-journals

Publisher: Mara Conner


Acquisitions Editor: Tim Pitts
Editorial Project Manager: Emily Thomson
Production Project Manager: Nirmala Arumugam
Designer: Matthew Limbert
Typeset by VTeX
Contents

List of contributors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
About the editors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix
Preface from the editors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiii
Acronyms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxv

PART 1 FUTURE COMMUNICATION NETWORKS AND


SYSTEMS
CHAPTER 1 On the need of computing in future
communication networks . . . . . . . . . . . . . . . . . . . . . . 3
Frank H.P. Fitzek, Patrick Seeling, Thomas Höschele,
Bruno Jacobfeuerborn
1.1 Evolution of communication networks . . . . . . . . . . . . . . . . . 3
1.1.1 The telephone networks: circuit-switched . . . . . . . . . 4
1.1.2 The Internet: packet-switched . . . . . . . . . . . . . . . . . . 6
1.1.3 The cellular communication networks . . . . . . . . . . . . 7
1.2 The 5G communication system . . . . . . . . . . . . . . . . . . . . . . 10
1.2.1 The 5G Atom core: use cases . . . . . . . . . . . . . . . . . . 11
1.2.2 First tier: the technical requirements . . . . . . . . . . . . . 20
1.2.3 Second tier: the concepts . . . . . . . . . . . . . . . . . . . . . 31
1.2.4 Third tier: the softwarization technologies . . . . . . . . 40
1.2.5 Fourth tier: innovation and novelties . . . . . . . . . . . . . 42
1.3 Softwarization: the game changer for network operators . . . 44
CHAPTER 2 Standardization activities for future
communication networks . . . . . . . . . . . . . . . . . . . . . . 47
Fabrizio Granelli, Patrick Seeling, Frank H.P. Fitzek,
Riccardo Bassoli
2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
2.2 Standardization in telecommunications . . . . . . . . . . . . . . . . 50
2.3 Standardization of future generation networks . . . . . . . . . . . 52
2.3.1 3GPP standardization . . . . . . . . . . . . . . . . . . . . . . . . 53
2.3.2 ETSI standardization . . . . . . . . . . . . . . . . . . . . . . . . 56
2.3.3 ITU-T standardization . . . . . . . . . . . . . . . . . . . . . . . 56
2.3.4 IETF/IRTF standardization . . . . . . . . . . . . . . . . . . . . 57

v
vi Contents

PART 2 CONCEPTS
CHAPTER 3 Network slicing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Fabrizio Granelli
3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
3.2 Network slice: concept and life cycle . . . . . . . . . . . . . . . . . . 65
3.3 Network slicing architectures . . . . . . . . . . . . . . . . . . . . . . . 67
3.3.1 Single owner, single controller . . . . . . . . . . . . . . . . . 69
3.3.2 Single owner, multiple tenants – SDN proxy . . . . . . . 70
3.3.3 Multiple owners, tenants . . . . . . . . . . . . . . . . . . . . . . 71
3.4 Network slicing examples . . . . . . . . . . . . . . . . . . . . . . . . . . 72
CHAPTER 4 Mobile edge cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Roberto Torre, Tung Doan, Hani Salah
4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
4.2 Mobile edge cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
4.2.1 Similar concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
4.2.2 Characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
4.2.3 Key enablers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
4.2.4 General architecture . . . . . . . . . . . . . . . . . . . . . . . . . 80
4.3 MANO frameworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
4.4 MEC example implementations . . . . . . . . . . . . . . . . . . . . . . 86
4.4.1 Tron demonstrator . . . . . . . . . . . . . . . . . . . . . . . . . . 86
4.4.2 Ball sorting machine . . . . . . . . . . . . . . . . . . . . . . . . . 87
4.4.3 Ambulance demonstrator . . . . . . . . . . . . . . . . . . . . . 87
4.4.4 Seamless migration for autonomous cars . . . . . . . . . . 88
CHAPTER 5 Content distribution . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Hani Salah, Sandra Zimmermann, Juan A. Cabrera G.
5.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
5.2 Content delivery networks . . . . . . . . . . . . . . . . . . . . . . . . . . 95
5.2.1 Content distribution . . . . . . . . . . . . . . . . . . . . . . . . . 96
5.2.2 Request routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
5.3 Information-centric networking . . . . . . . . . . . . . . . . . . . . . . 97
5.3.1 Operation primitives and packet types . . . . . . . . . . . . 99
5.3.2 Content naming . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
5.3.3 In-network caching . . . . . . . . . . . . . . . . . . . . . . . . . . 100
5.3.4 Node architecture and packet handling . . . . . . . . . . . 100
5.3.5 Content-based security . . . . . . . . . . . . . . . . . . . . . . . 103

PART 3 ENABLING TECHNOLOGIES


CHAPTER 6 Software-defined networks . . . . . . . . . . . . . . . . . . . . . 107
Justus Rischke, Hani Salah
6.1 Networking in today’s Internet . . . . . . . . . . . . . . . . . . . . . . 107
Contents vii

6.2 The road to SDN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109


6.2.1 What is software-defined networking? . . . . . . . . . . . 109
6.2.2 Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
6.2.3 SDN use cases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
6.3 Technologies and standards . . . . . . . . . . . . . . . . . . . . . . . . . 112
6.3.1 SDN controllers . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
6.3.2 SDN switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
6.3.3 OpenFlow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
6.3.4 P4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
6.3.5 NETCONF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
CHAPTER 7 Network function virtualization . . . . . . . . . . . . . . . . . 119
Riccardo Bassoli
7.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
7.2 Network function virtualization . . . . . . . . . . . . . . . . . . . . . . 121
7.3 NFV-SDN architectures . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
7.4 Programmable protocol stack . . . . . . . . . . . . . . . . . . . . . . . 126
7.5 Virtualization of RAN and BBU splitting . . . . . . . . . . . . . . 130

PART 4 INNOVATION TRACK


CHAPTER 8 Machine learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Riccardo Bonetto, Vincent Latzko
8.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
8.2 Supervised learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
8.2.1 Problem formulation . . . . . . . . . . . . . . . . . . . . . . . . . 136
8.2.2 Supervised learning workflow . . . . . . . . . . . . . . . . . . 137
8.2.3 Linear and logistic regression . . . . . . . . . . . . . . . . . . 146
8.2.4 Support vector machines . . . . . . . . . . . . . . . . . . . . . . 149
8.2.5 Decision trees . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
8.2.6 Artificial neural networks . . . . . . . . . . . . . . . . . . . . . 155
8.2.7 Convolutional neural networks . . . . . . . . . . . . . . . . . 159
8.3 Intermission . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
8.4 Reinforcement learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
8.4.1 Finite Markov decision processes . . . . . . . . . . . . . . . 163
8.4.2 Q-learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
8.4.3 The exploration vs. exploitation dilemma . . . . . . . . . 165
8.4.4 Deep Q-learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
CHAPTER 9 Network coding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Juan A. Cabrera G., Morten V. Pedersen, Frank
H.P. Fitzek
9.1 Interflow network coding – the basics . . . . . . . . . . . . . . . . . 169
9.1.1 The butterfly network . . . . . . . . . . . . . . . . . . . . . . . . 170
viii Contents

9.1.2 Alice and Bob topology . . . . . . . . . . . . . . . . . . . . . . 173


9.1.3 The X topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
9.1.4 The cross topology . . . . . . . . . . . . . . . . . . . . . . . . . . 174
9.2 Intraflow network coding – now it gets interesting . . . . . . . . 175
9.2.1 How to create coded packets . . . . . . . . . . . . . . . . . . . 180
9.2.2 RLNC and the butterfly . . . . . . . . . . . . . . . . . . . . . . 185
9.2.3 Impact of the coding parameters . . . . . . . . . . . . . . . . 186
9.2.4 The potential of recoding . . . . . . . . . . . . . . . . . . . . . 191
CHAPTER 10 Compressed sensing . . . . . . . . . . . . . . . . . . . . . . . . . . 197
Maroua Taghouti
10.1 Compressed sensing theory . . . . . . . . . . . . . . . . . . . . . . . . 197
10.1.1 Problem formulation . . . . . . . . . . . . . . . . . . . . . . . 197
10.1.2 Mathematical background . . . . . . . . . . . . . . . . . . . 199
10.1.3 Sparse and compressible signals . . . . . . . . . . . . . . 201
10.1.4 Measurement matrix design . . . . . . . . . . . . . . . . . 201
10.2 Basic reconstruction algorithms . . . . . . . . . . . . . . . . . . . . 203
10.2.1 Convex relaxation . . . . . . . . . . . . . . . . . . . . . . . . . 204
10.2.2 Greedy algorithms . . . . . . . . . . . . . . . . . . . . . . . . 205
10.2.3 Message passing . . . . . . . . . . . . . . . . . . . . . . . . . . 206
10.2.4 Reconstruction strategies discussion . . . . . . . . . . . 206
10.3 Sparse representation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
10.3.1 Well-known transforms . . . . . . . . . . . . . . . . . . . . . 207
10.3.2 Sparsifying dictionary/dictionary learning . . . . . . . 208
10.4 Distributed compressed sensing . . . . . . . . . . . . . . . . . . . . 209
10.4.1 Joint sparsity models . . . . . . . . . . . . . . . . . . . . . . 211
10.4.2 DCS reconstruction algorithms . . . . . . . . . . . . . . . 213
10.5 Compressed sensing for communications . . . . . . . . . . . . . 213
10.5.1 Compressed sensing for WSN . . . . . . . . . . . . . . . . 214
10.5.2 Kronecker compressed sensing . . . . . . . . . . . . . . . 214

PART 5 BUILDING THE TESTBED


CHAPTER 11 Mininet: an instant virtual network on your
computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
Zuo Xiang, Patrick Seeling
11.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
11.2 Mininet workflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
11.2.1 Create a network topology . . . . . . . . . . . . . . . . . . 221
11.2.2 Interact with a network . . . . . . . . . . . . . . . . . . . . . 223
11.2.3 Programmable network with SDN . . . . . . . . . . . . . 223
11.3 Demystifying Mininet . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
11.3.1 Resource management and isolation . . . . . . . . . . . 224
11.3.2 Configurable data plane . . . . . . . . . . . . . . . . . . . . 226
Contents ix

11.4 Create a tiny topology from scratch . . . . . . . . . . . . . . . . . . 229


CHAPTER 12 Docker: containerize your application . . . . . . . . . 231
Alexander Kropp, Roberto Torre
12.1 Introduction to Docker . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
12.2 Containers vs virtual machines . . . . . . . . . . . . . . . . . . . . . 232
12.3 Management, orchestration and external tools . . . . . . . . . . 233
12.3.1 Kubernetes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
12.3.2 Docker Swarm . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
12.4 Getting started with Docker . . . . . . . . . . . . . . . . . . . . . . . 236
12.4.1 Basic commands . . . . . . . . . . . . . . . . . . . . . . . . . . 236
12.4.2 Building an image – Dockerfile . . . . . . . . . . . . . . . 240
12.4.3 Services and stacks . . . . . . . . . . . . . . . . . . . . . . . . 241
12.4.4 Docker Swarm . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
CHAPTER 13 ComNetsEmu: a lightweight emulator . . . . . . . . . . 245
Zuo Xiang, Juan A. Cabrera G., Sreekrishna Pandi,
Patrick Seeling, Frank H.P. Fitzek
13.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
13.2 ComNetsEmu in a nutshell . . . . . . . . . . . . . . . . . . . . . . . . 249
13.2.1 Test environment management . . . . . . . . . . . . . . . 249
13.2.2 Application container management . . . . . . . . . . . . 250
13.3 Examples for getting started . . . . . . . . . . . . . . . . . . . . . . . 252
13.3.1 Echo server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
13.3.2 Docker-in-Docker for resource limitation . . . . . . . 255

PART 6 EXAMPLES
CHAPTER 14 Realizing network slicing . . . . . . . . . . . . . . . . . . . . . 259
Fabrizio Granelli, Truong Giang Nguyen, Huanzhuo Wu
14.1 Network slicing in Mininet . . . . . . . . . . . . . . . . . . . . . . . . 259
14.1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
14.1.2 Link capacity slicing . . . . . . . . . . . . . . . . . . . . . . . 260
14.2 Network slicing in ComNetsEmu . . . . . . . . . . . . . . . . . . . 263
14.2.1 Example 1: topology slicing . . . . . . . . . . . . . . . . . 265
14.2.2 Example 2: service slicing . . . . . . . . . . . . . . . . . . 268
14.2.3 Example 3: SDN proxy-based slicing . . . . . . . . . . 273
CHAPTER 15 Realizing mobile edge clouds . . . . . . . . . . . . . . . . . 277
Zuo Xiang, Carl Collmann, Patrick Seeling
15.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
15.2 Mechanisms and practical implementation . . . . . . . . . . . . 280
15.2.1 Without SDN/NFV technologies . . . . . . . . . . . . . . 280
15.2.2 With SDN/NFV technologies . . . . . . . . . . . . . . . . 280
15.3 ComNetsEmu experimentation . . . . . . . . . . . . . . . . . . . . . 283
x Contents

15.4 Emulation results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284


15.4.1 Latency measurement results on SDN controller . . 284
15.4.2 Latency measurement at client side . . . . . . . . . . . . 286
CHAPTER 16 Machine learning for routing . . . . . . . . . . . . . . . . . . 289
Justus Rischke, Peter Sossalla
16.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289
16.2 Fitting reinforcement learning to routing . . . . . . . . . . . . . . 289
16.2.1 Designing state and action space . . . . . . . . . . . . . . 290
16.2.2 Reward . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
16.2.3 Exploration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
16.3 Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
16.3.1 Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
16.3.2 Running the example . . . . . . . . . . . . . . . . . . . . . . 294
16.3.3 Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
16.3.4 Changing parameters . . . . . . . . . . . . . . . . . . . . . . 296
CHAPTER 17 Machine learning for flow compression . . . . . . . . 297
Máté Tömösközi
17.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
17.2 The compression oracle . . . . . . . . . . . . . . . . . . . . . . . . . . 300
17.3 The O2SC library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301
17.3.1 Examples of predefined oracles . . . . . . . . . . . . . . . 303
17.3.2 Defining oracles using machine learning . . . . . . . . 304
17.4 Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306
17.5 The interactive environment . . . . . . . . . . . . . . . . . . . . . . . 309
CHAPTER 18 Machine learning for congestion control . . . . . . . 313
Christian Leonard Vielhaus
18.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
18.2 Characterizing congestion . . . . . . . . . . . . . . . . . . . . . . . . . 313
18.3 Congestion window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
18.4 Designing the agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
18.5 Example with ComNetsEmu . . . . . . . . . . . . . . . . . . . . . . . 319
18.6 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322
18.6.1 Exercise 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322
18.6.2 Exercise 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322
18.6.3 Exercise 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
CHAPTER 19 Machine learning for object detection . . . . . . . . . 325
Zuo Xiang, Renbing Zhang, Patrick Seeling
19.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
19.2 Distributed YOLO with compression . . . . . . . . . . . . . . . . 330
19.2.1 Distributed YOLO: VNF and server . . . . . . . . . . . 330
19.2.2 Model split . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
Contents xi

19.2.3 Inside YOLO . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332


19.2.4 Feature map compression . . . . . . . . . . . . . . . . . . . 333
19.3 Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
19.3.1 Infinite forwarding VNF . . . . . . . . . . . . . . . . . . . . 336
19.3.2 Limited forwarding VNF . . . . . . . . . . . . . . . . . . . 337
CHAPTER 20 Network coding for transport . . . . . . . . . . . . . . . . . . 339
Justus Rischke, Zuo Xiang
20.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
20.2 Network coding as virtualized network function . . . . . . . . 341
20.2.1 Virtualization approaches . . . . . . . . . . . . . . . . . . . 341
20.2.2 Coding the traffic . . . . . . . . . . . . . . . . . . . . . . . . . 342
20.3 Multihop recoding example . . . . . . . . . . . . . . . . . . . . . . . . 342
20.4 Adaptive redundancy example . . . . . . . . . . . . . . . . . . . . . . 344
20.4.1 Delivery probability of packets . . . . . . . . . . . . . . . 344
20.4.2 Running the example . . . . . . . . . . . . . . . . . . . . . . 346
20.4.3 Example results . . . . . . . . . . . . . . . . . . . . . . . . . . 348
CHAPTER 21 Network coding for storage . . . . . . . . . . . . . . . . . . . 351
Robert-Steve Schmoll
21.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351
21.2 Distributed storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351
21.3 Network coding in distributed storage . . . . . . . . . . . . . . . . 353
21.4 Running the example . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354
21.4.1 Uncoded repair . . . . . . . . . . . . . . . . . . . . . . . . . . . 355
21.4.2 Simple network code with replication . . . . . . . . . . 357
21.4.3 Network coding with recoding . . . . . . . . . . . . . . . 358
CHAPTER 22 In-network compressed sensing . . . . . . . . . . . . . . . 361
Maroua Taghouti, Malte Höweler
22.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361
22.2 Point-to-point scenario . . . . . . . . . . . . . . . . . . . . . . . . . . . 362
22.2.1 Using DCT for data sparsification . . . . . . . . . . . . . 363
22.2.2 Using a trained dictionary for data sparsification . . 364
22.3 Single-cluster scenario . . . . . . . . . . . . . . . . . . . . . . . . . . . 365
22.3.1 Using DCT for data sparsification . . . . . . . . . . . . . 365
22.3.2 Using a trained dictionary for data sparsification . . 367
22.4 Next steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370
CHAPTER 23 Security for mobile edge cloud . . . . . . . . . . . . . . . . 371
Simon Hanisch, Amr Osman, Tao Li, Thorsten Strufe
23.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371
23.2 Network segmentation . . . . . . . . . . . . . . . . . . . . . . . . . . . 372
23.2.1 Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372
23.2.2 Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . 374
xii Contents

23.2.3 nftables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374


23.3 Network isolation exercise . . . . . . . . . . . . . . . . . . . . . . . . 375
23.3.1 Blacklisting and whitelisting . . . . . . . . . . . . . . . . . 376
23.3.2 Stateful filtering . . . . . . . . . . . . . . . . . . . . . . . . . . 377
23.3.3 Chains and jumps . . . . . . . . . . . . . . . . . . . . . . . . . 378
23.4 Secure network tunnels . . . . . . . . . . . . . . . . . . . . . . . . . . . 380
23.4.1 Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380
23.4.2 Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . 382
23.4.3 Wireguard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382
23.5 Secure network tunnel exercise . . . . . . . . . . . . . . . . . . . . . 382
23.5.1 Man-in-the-middle . . . . . . . . . . . . . . . . . . . . . . . . 383
23.5.2 Tunnel network . . . . . . . . . . . . . . . . . . . . . . . . . . . 384

PART 7 EXTENSIONS
CHAPTER 24 Connecting to the outer world . . . . . . . . . . . . . . . . . 389
Fabrizio Granelli
24.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389
24.2 Connecting ComNetsEmu to the Internet . . . . . . . . . . . . . 389
24.2.1 Manual host configuration . . . . . . . . . . . . . . . . . . 390
24.2.2 Using NAT service . . . . . . . . . . . . . . . . . . . . . . . . 393
24.2.3 Using DNS resolution . . . . . . . . . . . . . . . . . . . . . . 393
24.3 Connecting different test bed VMs . . . . . . . . . . . . . . . . . . 394
24.4 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
24.4.1 Exercise 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
24.4.2 Exercise 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
CHAPTER 25 Integrating time-sensitive networking . . . . . . . . . . 401
Marian Ulbricht, Javier Acevedo
25.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401
25.2 IEEE802.1AS – if timing matters . . . . . . . . . . . . . . . . . . . 402
25.3 Different shapes of packets – IEEE802.1Qav and
IEEE802.1Qbv . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404
25.3.1 Credit-based shaper . . . . . . . . . . . . . . . . . . . . . . . 404
25.3.2 Time-aware shaper . . . . . . . . . . . . . . . . . . . . . . . . 407
25.4 IEEE802.1Qci – you shall not pass! . . . . . . . . . . . . . . . . . 407
25.5 IEEE802.1Qbu, IEEE802.3br – filling the gaps . . . . . . . . . 409
25.6 Hands-on: time-sensitive queueing in the new Linux kernel
5.2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410
25.6.1 ComNetsEmu setup . . . . . . . . . . . . . . . . . . . . . . . 410
25.6.2 Using the TAS simulator . . . . . . . . . . . . . . . . . . . . 410
25.6.3 Preparing the TAS . . . . . . . . . . . . . . . . . . . . . . . . 411
25.6.4 Measurement and results . . . . . . . . . . . . . . . . . . . . 411
Contents xiii

CHAPTER 26 Integrating software-defined radios . . . . . . . . . . . . 413


Javier Acevedo, Marian Ulbricht, Dongho You
26.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413
26.2 Basic principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415
26.2.1 What is programmable in SDR? . . . . . . . . . . . . . . 415
26.2.2 Design considerations . . . . . . . . . . . . . . . . . . . . . . 416
26.2.3 Design constraints . . . . . . . . . . . . . . . . . . . . . . . . 417
26.3 Software stacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 418
26.3.1 Universal Software Radio Peripheral (USRP) . . . . 418
26.3.2 GNU radio . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 418
26.4 Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 419
26.4.1 Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 420
26.4.2 OFDM transceiver exercise . . . . . . . . . . . . . . . . . . 420
26.4.3 Latency measurement exercise . . . . . . . . . . . . . . . 423

PART 8 TOOLS
CHAPTER 27 Networking tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431
Sreekrishna Pandi, Alexander Kropp,
Roland Schingnitz, Sebastian A.W. Itting
27.1 Connectivity testing – ping . . . . . . . . . . . . . . . . . . . . . . . . 432
27.2 Basic network administration – iproute2 . . . . . . . . . . . . . . 433
27.2.1 ip addr . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433
27.2.2 ip link . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 434
27.2.3 ip route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435
27.3 Traffic generation – iPerf . . . . . . . . . . . . . . . . . . . . . . . . . 436
27.4 Process monitoring – htop . . . . . . . . . . . . . . . . . . . . . . . . . 438
27.5 Network traffic manipulation – TC . . . . . . . . . . . . . . . . . . 439
27.6 Traffic monitoring – tcpdump/Wireshark . . . . . . . . . . . . . . 444
27.6.1 tcpdump . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445
27.6.2 Wireshark . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446
27.7 Rapid Python prototyping – Jupyter . . . . . . . . . . . . . . . . . 448
27.8 Hands-on example to tie all tools together . . . . . . . . . . . . . 451

Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473
List of contributors

Javier Acevedo
Technische Universität Dresden, Dresden, Germany
Riccardo Bassoli
Technische Universität Dresden, Dresden, Germany
Riccardo Bonetto
Technische Universität Dresden, Dresden, Germany
Juan A. Cabrera G.
Technische Universität Dresden, Dresden, Germany
Carl Collmann
Technische Universität Dresden, Dresden, Germany
Tung Doan
Technische Universität Dresden, Dresden, Germany
Frank H.P. Fitzek
Technische Universität Dresden, Dresden, Germany
Fabrizio Granelli
University of Trento, Trento, Italy
Simon Hanisch
Technische Universität Dresden, Dresden, Germany
Thomas Höschele
Technische Universität Dresden, Dresden, Germany
Malte Höweler
Technische Universität Dresden, Dresden, Germany
Sebastian A.W. Itting
Technische Universität Dresden, Dresden, Germany
Bruno Jacobfeuerborn
Deutsche Telekom Group, Bonn, Germany
Alexander Kropp
Technische Universität Dresden, Dresden, Germany
Vincent Latzko
Technische Universität Dresden, Dresden, Germany

xv
xvi List of contributors

Tao Li
Technische Universität Dresden, Dresden, Germany
Truong Giang Nguyen
Technische Universität Dresden, Dresden, Germany
Amr Osman
Technische Universität Dresden, Dresden, Germany
Sreekrishna Pandi
Technische Universität Dresden, Dresden, Germany
Morten V. Pedersen
Technische Universität Dresden, Dresden, Germany
Justus Rischke
Technische Universität Dresden, Dresden, Germany
Hani Salah
Technische Universität Dresden, Dresden, Germany
Roland Schingnitz
Technische Universität Dresden, Dresden, Germany
Robert-Steve Schmoll
Technische Universität Dresden, Dresden, Germany
Patrick Seeling
Central Michigan University, Mount Pleasant, MI, United States
Peter Sossalla
Technische Universität Dresden, Dresden, Germany
Thorsten Strufe
Technische Universität Dresden, Dresden, Germany
Maroua Taghouti
Technische Universität Dresden, Dresden, Germany
Máté Tömösközi
Technische Universität Dresden, Dresden, Germany
Roberto Torre
Technische Universität Dresden, Dresden, Germany
Marian Ulbricht
Technische Universität Dresden, Dresden, Germany
List of contributors xvii

Christian Leonard Vielhaus


Technische Universität Dresden, Dresden, Germany
Huanzhuo Wu
Technische Universität Dresden, Dresden, Germany
Zuo Xiang
Technische Universität Dresden, Dresden, Germany
Dongho You
Technische Universität Dresden, Dresden, Germany
Renbing Zhang
Technische Universität Dresden, Dresden, Germany
Sandra Zimmermann
Technische Universität Dresden, Dresden, Germany
About the editors

Frank H.P. Fitzek is Professor and head of the “Deutsche Telekom Chair of Com-
munication Networks” at TU Dresden coordinating the 5G Lab Germany since 2014.
He is the spokesman of the DFG Cluster of Excellence “Center for Tactile Internet”
(CeTI). He received his diploma (Dipl.-Ing.) degree in electrical engineering from the
University of Technology – Rheinisch-Westfälische Technische Hochschule (RWTH)
– Aachen, Germany, in 1997 and his Ph.D. (Dr.-Ing.) in Electrical Engineering from
the Technical University Berlin, Germany, in 2002 and became Adjunct Professor at
the University of Ferrara, Italy, in the same year. In 2003, he joined Aalborg Uni-
versity as Professor. In 2015, he was awarded the honorary degree “Doctor Honoris
Causa” from Budapest University of Technology and Economics (BUTE).

Fabrizio Granelli is Associate Professor at the Department of Information Engi-


neering and Computer Science (DISI) – University of Trento, Italy, IEEE ComSoc
Director for Educational Services (2018–2019) and Chair of Joint IEEE VTS/Com-
Soc Italian Chapter. He is Research Associate Professor at the University of New
Mexico, NM, USA. He received the M.Sc. and Ph.D. degrees from University of
Genoa, Italy, in 1997 and 2001. He was a visiting professor at the State Univer-
sity of Campinas, Brasil, and at the University of Tokyo, Japan, and IEEE ComSoc
Distinguished Lecturer in 2012–2015. He is Associate Editor in Chief of IEEE Com-
munications Surveys and Tutorials.

Patrick Seeling is Professor at the Department of Computer Science at Central


Michigan University, USA. He received his diploma (Dipl.-Ing.) degree in Indus-
trial Engineering and Management from the Technical University Berlin, Germany,
in 2002 and his Ph.D. in Electrical Engineering from Arizona State University, USA,
in 2005. He was an Associated Faculty at ASU until 2008 and an Assistant Professor
at the University of Wisconsin-Stevens Point until 2011. In 2011, he joined Central
Michigan University as Assistant Professor, where he became a tenured Associate
Professor in 2015 and a Full Professor in 2018.

xix
Preface from the editors

This book is the result of a series of tutorials, generally on the topic of Computing in
Communication Networks, that we offered at several IEEE conferences over the last
years. Furthermore, parts of this book are outcomes of our lecture series in Dresden,
such as Communication Networks I, II, and III, Network Coding, and Cooperation
in Communication Networks. These particular courses are based on classical lecture
elements and aligned with several problem-based learning course elements, where
the students work on their individual (mini) projects. Therefore we hope that other
educators will find this book helpful in providing easy access to the topic. We simi-
larly hope that students in courses related to computing in communication networks
will find this book helpful to provide valuable learning experiences, particularly by
means of the examples presented in this book.
This book features several tutorial-style chapters in its beginning to provide (stu-
dent) readers with a basic understanding of communication systems and technologies,
assuming a basic familiarity with the overall content domain. We keep this introduc-
tory content to a minimum and focus directly on applied examples for an intuitive
approach to the subject matter. Whenever possible, we provide the interested reader
with additional background references for further studies. We similarly note that the
examples provided in this book are optimized for teaching purposes and are not suited
for production. This book is also the outcome of direct requests from our students
over the last years to have a complete lecture script rather than a set of, hopefully
nice, slides. It is always difficult to aim at a moving target, and the topic of this book
is so current that we had to make a choice of the content to include, selecting what
will likely have the highest possible impact in the future. We maintain a companion
website for this book to improve the provided examples, introduce additional content
over time, and to collect your feedback.

https://cn.ifn.et.tu-dresden.de/compcombook

Furthermore, we provide presentation slide decks to aid educators and students


of Computing in Communication Networks in utilizing this book in their educational
endeavors. QR codes next to the page will lead the reader to web pages for further
reading or videos.
There are several ways to read this book. Its structure consists of eight major parts
and 27 chapters, as illustrated in Fig. 0.1. For students, we propose to read the book
sequentially from beginning to the end. Chapter 1 provides a solid introduction to the
topic and connects all necessary technologies that will be discussed in greater detail in
the subsequent chapters. Chapter 2 lists several standardization activities, completing
Part 1. Parts 2 and 3 describe the underlying concepts and enabling technologies for
computing in communication networks, whereas Part 4 describes current innovations
that are made possible and are likely to be implemented at scale in the near future.

xxi
xxii Preface from the editors

FIGURE 0.1
Structure of this book.

The first four parts are helpful information for the reader to understand the examples
and to motivate the need for computing in future communication networks.
The core of this book is the ComNets emulator described in Part 5 together with
the underlying software implementations Mininet and Docker. Experts that are famil-
iar with the underlying theoretical topics could directly start with this part. In Part 6,
examples are provided to deploy the various technologies described in the prior parts
of the book. Part 7 contains extensions to the ComNets emulator. The last part, Part 8,
introduces the basic tools used in the aforementioned examples.
Now we wish all students a lot of fun reading this book and trying out the exam-
ples. We look forward to new examples that will be generated in our Problem-Based
Learning courses in the future.

Frank H.P. Fitzek


Fabrizio Granelli
Patrick Seeling
2020
Acknowledgments

First of all, the editors would like to thank the numerous authors that have contributed
the different chapters to this book. Most of the authors were Ph.D. students or post-
docs at the time of writing with the Deutsche Telekom Chair of Communication
Networks. They have contributed significant time in addition to their regular duties
to make this book possible. We express deep gratitude to the Deutsche Telekom,
especially Tim Höttges, Claudia Nemat, Alex Jin Sung Choi, Antje Williams, and
Daniel Brower, for their continuous support over the last years and their insights into
the future of communication systems. Several examples presented in this book have
been carried out with the 5G Lab Germany, comprised of 23 professors, over 600
researchers, and 20 industrial partners. We would like to explicitly mention Bosch,
BMW, DE-CIX, Ericsson, Magna, Nokia, and Volkswagen. The Centre for Tactile
Internet with Human-In-The-Loop (CeTI) provided us with an abundance of moti-
vation over the last years, showing the clear need for computation in the network
beyond 5G use cases. With the financial support of the center, we are able to con-
duct research in this exciting field. We thank our design team Jens Krzywinski, Tina
Bobbe, Lisa Lueneburg, and their team members for the support in generating de-
signs and graphics for several demonstrators and illustrations presented in the book.
Special thanks go to Oleksandr Zhdanenko and Ievgen Kharabet for the wonderful
design and illustration of numerous virtual worlds. Their work did not only give the
book a nice look, but over the last years helped us to convey the main idea of future
communication systems to the public. The work on this book would not have been
possible without the endless support of our universities Technische Universität Dres-
den, University of Trento, and Central Michigan University. We are deeply thankful
to Christian Scheunert for his support in managing the LATEX sources and his patience
over the last months. It is his achievement to have all the sources of this book pulled
together.

Frank H.P. Fitzek


Fabrizio Granelli
Patrick Seeling
2020-01-01

xxiii
Acronyms

1G 1st Generation
2G 2nd Generation
3G 3rd Generation
3GPP 3rd Generation Partnership Project
4G 4th Generation
5G 5th Generation

ACK Acknowledgement
ACM Association for Computing Machinery
ADC Analog-to-Digital Converter
AI Artificial Intelligence
AII Administrative Instance Identifier
AKA Authentication and Key Agreement
AMF Access Management Functions
AMP Approximate Matching Pursuit
ANN Artificial Neural Network
ANNs Artificial Neural Networks
API Application Programming Interface
AR Augmented Reality
ARIB Association of Radio Industries and Businesses
ARP Address Resolution Protocol
ARPANET Advanced Research Projects Agency NETwork
ARQ Automatic Repeat reQuest
AS Autonomous System
ASIC Application-Specific Integrated Circuit
ATIS Alliance for Telecommunications Industry Solu-
tions

BASH Bourne-Again SHell


BB BaseBand
BBU Baseband Unit
BDP Bandwidth-Delay Product
BGP Border Gateway Protocol
BOMP Block Orthogonal Matching Pursuit

xxv
xxvi Acronyms

BP Basis Pursuit
BPDN Basis Pursuit De-Noising
BPF Berkley Packet Filter
BS Base Station
BSI British Standards Institution
BW BandWidth

CA Collision Avoidance
CAPEX CAPital EXpenses
CART Classification And Regression Tree
CBS Credit-based Shaper
CCE Categorical CrossEntropy
CCN Content-Centric Networking
CCSA China Communications Standards Association
CDF Cumulative Distribution Function
CDMA Code-Division Multiple Access
CDN Content Delivery Network
CDNs Content Delivery Networks
CFS Customer Facing System
Cgroups Control Groups
CIR Commited Information Rate
CLI Command Line Interface
CMP Constrained Matching Pursuit
CN Core Network
CNN Convolutional Neural Network
COIN Computing in the Network
COINRG Computing in the Network Proposed Research
Group
ComNetsEmu ComNets Emulator
CoSaMP Compressive SaMPling
COTS Commercial Off-The-Shelf
CPRI Common Public Radio Interface
CPS Cyber-Physical System
CPU Central Processing Unit
C-RAN Cloud Radio Access Network
CRC Cyclic Redundancy Check
CS Content Store
CSI Channel State Information
CSMA Carrier-Sense Multiple Access
Acronyms xxvii

CSMPSP Compressive Sampling Matching Pursuit with Sub-


space Pursuit
CSRC Contributing Source
CT Core Network and Terminals
CTCP Compressed TCP
CTS Clear To Send
CV Computer Vision
cwnd congestion window

DAC Digital-to-Analog Converter


DB DataBase
DCS Distributed Compressed Sensing
DCS-SOMP DCS-Simultaneous Orthogonal Matching Pursuit
DCT Discrete Cosine Transform
DFS Depth-First Search
DHCP Dynamic Host Configuration Protocol
DIN Deutsches Institut für Normung
DINRG Decentralized Internet Infrastructure
DNN Data Network Name
DNS Domain Name System
DONA Data-Oriented Network Architecture
DoS Denial of Service
DPDK Data Plane Development Kit
DPI Deep Packet Inspection
DQN Deep Q-Learning
DSP Digital Signal Processor
DSS Distributed Storage System

eBPF Extended Berkeley Packet Filter


EBS Excess Burst Size
EC Edge Computing
ECG ElectroCardioGram
EGP Exterior Gateway Protocols
EIR Excess Information Rate
EM Element Management
eMBB Enhanced Mobile BroadBand
EMP Expander Matching Pursuit
ESO European Standards Organization
ETSI European Telecommunications Standards Institute
xxviii Acronyms

FEC Forward Error Correction


FFT Fast Fourier transform
FIA Future Internet Architectures
FIB Forwarding Information Base
FIFO First In First Out
FISTA Fast Iterative Shrinkage-Thresholding Algorithm
FNC Fulcrum Network Coding
FOSS Free and Open-Source Software
FPGA Field Programmable Gate Array
FTP File Transfer Protocol
FW FireWall

GCL Gate Control List


GD Gradient Descent
gNB Next generation Node B
gNB-CU Next generation Node B Centralized Unit
gNB-DU Next generation Node B Distributed Unit
gNB-RU Next generation Node B Radio Unit
GNU/Linux GNU is Not Unix with Linux added
GPP General Purpose Processors
GPS Global Possitioning System
GPU Graphics Processing Unit
GRE Generic Routing Encapsulation

HARQ hybrid automatic repeat request


HDD Hard Disk Drive
HDL Hardware Description Languages
HDMI High Definition Multimedia Interface
HEVC High Efficiency Video Coding
HFCS Hierarchical Fair Service Curve
HSPA High Speed Packet Access
HTB Hierarchical Token Bucket
HTP Hard Thresholding Pursuit
HTTP Hypertext Transfer Protocol

I/O Input/Output
ICMP Internet Control Message Protocol
ICN Information-Centric Networking
Acronyms xxix

ICNRG Information-Centric Networking Research Group


ICT Information and Communications Technology
ID Identifier
IEEE Institute of Electrical and Electronics Engineers
IETF Internet Engineering Task Force
IFFT inverse Fast Fourier transform
IGMP Internet Group Management Protocol
IGP Interior Gateway Protocols
IHT Iterative Hard Thresholding
IMS IP Multimedia Subsystem
IMT2020 International Mobile Telecommunications-2020
IoT Internet of Things
IP Internet Protocol
IPAM IP Address Management
IPC Inter-Process Communication
IPFS InterPlanetary File System
IPV Internal Priority Value
IPv4 Internet Protocol Version 4
IPv6 Internet Protocol Version 6
IRTF Internet Research Task Force
ISG Industry Specification Group
ISI Inter Symbol Interference
ISM Industrial, Scientific, and Medical
ISO International Organization for Standardization
ISP Internet Service Provider
IST Iterative Shrinkage-Thresholding
ITU-T ITU Telecommunication Standardization Sector

JPEG Joint Photographic Experts Group


JSM Joint Sparse Model

KCS Kronecker Compressed Sensing


KPI Key Performance Indicator

L2 OSI Layer 2
L3 OSI Layer 3
LAN Local Area Network
LARS Least Angle Regression
LASSO Least Absolute Shrinkage and Selection
Another Random Scribd Document
with Unrelated Content
298 VisscHER (Schip), 6. VlAMINGH V. OUDTSHOORN
(Arnold de), 191, 12. Vlamingh (Willem de), 30. Vleermuijse of
Vlersmus Eijl., 24, 82. Vliegebay, 86. Vlissingen, 129, T4. Voeten
(Oude Amst.e), 262, gg. Vriendschaps of Tonga E.^n^ zie T. Vries
(David Pietersz de), 34. Vries (Marten Gerritsz), 153, 185, 5, 6, 9,
16, 17, 97. Vrouwenborsten (Eil.), 57. VuLCANis of Het Brandende
EijLANT, zie B. Vulkaan of Manam (Eil.), zie M. VUURLAND, 33.
Vyanen, zie Viana. W. Wagenaar (Jan), 262, 264. Wahaai, 256.
Waigeoe (Eil.), 125 — 128, 249, 251, 5P. 60, 78, 94. Waigeoe
(Straat), pj. Wai Saleja (Hk.), 132. „ Selah (Hk.), 256. Wajag (Eil.),
126. Wakde E.en^ 115, 123, j'p. Walch (Johannes), 263. Walker (J.
B.), 212, 214, 231, 232. „ MemorialVolume,2I3, 231, 232, 36.
Walvisschen, 23. Wanga (Jurregan), 133. Wariai (Hk.), 60.
Wassenaer (N. V.), 26. Wateren (Ambonsche), 2. „ (Chin.), 4, 3.
(Ind.), 3. „ (Jap.), 4, 3, 14. Waterplaets, 82, 83. Water-weereld, zie
Zee-Atlas. Wedda E.kn, 60. r, (Hk.), 130, 60. Weeskamer v. Bat., 12.
Weesp (Schip), 2. Wellesley E.en, 86. Wesel (Schip), 142, i68,
172,2(5. Wessel (Eil), 87. Westewindenweer, 228. West-Indië, zie I.
West-Ind. Compagnie, 65. „ Octroij, 156, 167, 183, 75' Wiak (Eil.),
122, 256. WiCHMANN (A.), 213, 214, 216, 270, 20, 37, 34— 5Ó, 60.
Wieder (F. C), 267. W1E1 of Jacouinot (Eil.), 112. Wilhelm Frederik
(Pr.v.0,), ï86. WiLLAUMEZ (Sch.eil.), 107, 108. Willems Rhede, 119.
WiLLEMS of WiLMS RiV., 143, 148, 149, 155, 162, 175, 183, 29, jo,
33, 40, 41, 61, 81, 88. WiLLiAM (Kp. King), 38. Wilmot Range, 24,
224, 225. WiTOE of Fransche E.en, zie F. Wit (Frederick de), 269.
Wits (de) E.^n, 29, 71. WiTSEN of WiTZEN (Comelis), 144, 153.
157» 164, 173, 270, 271, 8t, g6. WiTSEN (Corn.) Reede, 119. E.EN,
4^, „ Riv., 86. „ (Nicolaas), 15, 270, 271. WiTT (G. F. de), 27, 28. „ „
's LAND, 175, 27, 28. WiTT (de) -District, 27. WoENOH Baai, 126.
W01DE (Ch, G.), 271, 70. WoKEO of RoissY (Eil.), zie R.
299 WONNERAM of FeNI E.^N^ 97. Y. Yk (Cornelis v.), pj.
Ymuiden, 8j. York of Carpentaria (Sch.eil.), 24, 41, Ss^ Z. Zaragoza
(Oon Juste de), j/. Zee (Indische), zie OceaaN. Zee-Atlas ofte Water-
WeeRELD, 269, SSZee-meeuw (Schip), 169, 170, 173, 180—183,
272. 7S, 75, 76. 77. Zee-Spiegel, 206, 209. Zeefakkel (Ne Lichtende),
jj. Zeehaan (Mt.), 24, 224, 225, 227, 44. Zeehaen (Schip), 3 — 11,
14 — 17, 20—22, 25—29, 32, 34,36,37. 40—43, 48—53. 6r, diy 73,
74, 79,83,84,87, 90, 97, loi, 113 — 116, 130, 143 — 145, 151 —
i54> 157 — 159, 163—166, 169, 184, 200, 210, 216, 272, 5', 39,
40, 43, 44, 46, 52, 61, 63, 71, 73. 78. Zeehaen's Bocht, 45, 234, 47,
48, 68. Zeekaarten, zie K. Zeelandia (Fort), 5. Zeelandia Nova, zie N.
Zeerobben, 19. Zeeuwsche Nachtegaal (Schip), 2. Zeevaarders
(Holl.), J, 17. „ (Port.), 144, 37' (Sp.), 17, 84 Zeevaert (Cleyne en
groote), 205. Zei laanwijzingen (Bat.-Pescadores), 16. Zeilaanwijz.
(Bat.-Punte Gale), p. „ (Britsche), 231, 50, Zeilaanwijz. in de Chin.
wateren, 5. Zeilsteen (Mijnen v.), zie M. Zilverschepen (Sp.), 8.
Zilvervloot (Sp.), 17. Zoute E.kn, 6. Zuiderzee. 87. ZUIDLAND,
ZUIJDTLANDT, ZuiDERLAND of SUIJDERLANDT, I, 21, 44, 142 —
145, 148, 149, 153— 157, 159—164, 166—177, 182— 185, 266,
270, 272, 8, IJ, 17, 18, 21—26, 33—38, 41— 44. 55, 61—63, 67, 7^
—76. 81, 87, p/, p4, 95. Zuidoost BAAiof Haven (Maur.), 12, 13, 215,
218. Zuidpool, 37. „ -K.AART, 268. Zuidzee, Zuijtzee of Suijtsee, 87,
143, 148, 149, 155, 165— 167, 173—175. 183. 271, 34. 33, 40, 42,
47, 49, 50, 61, 62, 74. 81. 84. Zuidzee E.en, j6, 42, 97. Zunda, zie
Soenda. Zutphen (Schip), 6. ZuiJD Caep, 30, 31. Zuijdwijck (Adriaen
v.), 169.
VERBETERINGEN. P. 38 reg.J^ V. 0. staat: dach moet zgn :
middach l) »43 , 12 V. 0. „ NOtN n OtN2) „119 en 127, , , I V. 0, 9
Sept. >» 8 Sept. „ t20 , , I V. 0. , Mamberomno 1» Mamberonmo.
,,151 , 2 V. b. , insoleutie »» insolentie. » 233 , I V. 0. , , NOtN n OtN
„ XXVII , , I V. 0. de Witt's krt. »> Hess. Gerr.'s krt „XXX , , 3 en 20 ,
, D. Hartog n D. Hartogs. „ XXXIV , , 8v.b. , Cornelisz. 1» Willem
Corn. „ XXXVIII , , 3 V. 0. , sub 12 M sub 2. „ LVII , 8v.b. , Oembooi
» Oemboi. „ LXXXV , , 21 V. b. , Musgrave E. »> Mulgrave E. „
LXXXVI , , I V. 0. , hierachter »> sub 8 en 9. i) Dit moet een
schrijffout wezen van den copieerder van het Extract-Journaal,
hetgeen blijkt uit de alstoen genomen peilingen in verband met het
middagbestek. 2) Als boven, zooals blijkt uit de bestekken tusschen
^ bij NO H.* Moordenaers Baai, 17/18 Dec. en ^ Admiralty Bay, 21
Dec, in verband met den Journaaltekst in die dagen; o.a. op 20 Dec.
(p. 46, reg. 9 v. b.).
The text on this page is estimated to be only 8.13%
accurate

ttehoo'l ^v Werken nitgei:' r door de Linsehotcn t Q


Seychellftt - — ?p o. /' ■% Amsterdam S.Paal A, Kerg. (Rotltrdamyr
>- r in. '-ty AtafP^lstaartEJ Route van de ,Heemskerck' en
^Zeehaen" in 1642143. De nomen door Tasman gegeven, staan
tusschen ( ). Route van Je J^^""- .Zee-Meeaw' en .Brack" in 1644.
Lith J. Smulders & Cx. O.'-t Mj.
The text on this page is estimated to be only 0.00%
accurate
l
DU Tasman, Abel Janszoon 98 De reizen van Abel T2
Janszoon Tasman en Franchoys 1919 Jacobszoon Visscher PLEASE
DO NOT REMOVE CARDS OR SLIPS FROM THIS POCKET
UNIVERSITY OF TORONTO LIBRARY
The text on this page is estimated to be only 9.00%
accurate

I
The text on this page is estimated to be only 0.00%
accurate

IJftl*-?' ^^^ÈU±
The text on this page is estimated to be only 0.00%
accurate

V
The text on this page is estimated to be only 0.00%
accurate

^
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

textbookfull.com

You might also like