Enabling Industrial Network Slicing Orchestration: A Collaborative Edge Robotics Use Case

Author(s):  
Ioannis Dimolitsas ◽  
Marios Avgeris ◽  
Dimitrios Spatharakis ◽  
Dimitrios Dechouniotis ◽  
Symeon Papavassiliou

The traditional network is configured based on the prescribed network requirements. Sometimes the resources of the network are underutilized and at sometimes there may resource starvation because of the static configuration of the network. As against traditional network, which is operated either as dedicated network or as an overlay network, network services can be operated over a shared network infrastructure. Thus maximum resource utilization under minimal infrastructure cost can be achieved. The on-demand network requirement can be configured dynamically using network slice. The backbone of the rapidly evolving 5G technology is network slice and service networks can be benefited from it. Different network function for multiple tenants can be enabled customized using network slice with each slice operating independently. Network slice can be offered as a service to meet various requirements from the network slice tenant with different granularities. The Software Defined Networking and Network Function Virtualization are the enabling technologies for network slice. This paper discusses various network slicing use case requirements. And also OpenFlow based software defined network environment is simulated to validate the discussions. Experimental results show that the efficiency of the service network is maximized with improved reliability of service


Network slicing is widely studied as an essential technological enabler for supporting diverse use case specific services through network virtualization. Industry verticals, consisting of diverse use cases requiring different network resources, are considered key customers for network slices. However, different approaches for network slice provisioning to industry verticals and required business models are still largely unexplored and require further work. Focusing on technical and business aspects of network slicing, this article develops three new business models, enabled by different distributions of business roles and management exposure between business actors. The feasibility of the business models is studied in terms of; the costs and benefits to business actors, mapping to use cases in various industry verticals, and the infrastructure costs of common and dedicated virtualization infrastructures. Finally, a strategic approach and relevant recommendations are proposed for major business actors, national regulatory authorities, and standards developing organizations.


Author(s):  
Pedro Henrique Gomes ◽  
Magnus Buhrgard ◽  
János Harmatos ◽  
Swarup Kumar Mohalik ◽  
Dinand Roeland ◽  
...  

Closed loops are key enablers for automation that have been successfully used in many industries for long, and more recently for computing and networking applications. The Zero-touch network and service management (ZSM) framework introduced standardized components that allow the creation, execution, and governance of multiple closed loops, enabling zero-touch management of end-to-end services across different management domains. However, the coordinated and optimal instantiation and operation of multiple closed loops is an open question that is left for implementation by the ZSM specifications. In this paper, we propose a methodology that uses intents as a way of communicating requirements to be considered by autonomous management domains to coordinate hierarchies of closed loops. The intent-driven methodology facilitates hierarchical and peer interactions for delegation and escalation of intents. Furthermore, it extends the existing management capabilities of the ZSM framework and facilitates conflict-free integration of closed loops by setting optimal (and non-conflicting) goals that each closed loop in the hierarchy needs to account for. We show an example of the application of the proposed methodology in a network slicing assurance use case. The new capabilities introduced in this paper can be considered as an extension of the ZSM framework to be used in scenarios where multiple intent-driven closed loops exist.


2018 ◽  
Vol 7 (2) ◽  
pp. 144
Author(s):  
Arsia Rini ◽  
Heki Aprianto

Tempat pelayanan kesehatan bertujuan untuk memberikan pelayanan kesehatan kepada masyarakat melalui lembaga institusi pelayanan kesehatan. Masyarakat di Kota Palembang mendapatkan informasi tempat pelayanan kesehatan melalui informasi masyarakat sekitar, lembaga pelayanan kesehatan dan beberapa situs internet yang ditampilkan secara terpisah. Maka sebuah website geografis diperlukan untuk menampilkan tata letak lokasi pelayanan kesehatan dan informasi lengkap tentang pelayanan kesehatan di Kota Palembang. Penelitian ini bertujuan untuk membuat sebuah pemodelan website geografis tempat pelayanan kesehatan di Kota Palembang. Pemodelan yang digunakan berbasis object oriented dengan menerapkan use case diagram dan activity diagram.


ICIT Journal ◽  
2020 ◽  
Vol 6 (1) ◽  
pp. 50-60
Author(s):  
Ilamsyah Ilamsyah ◽  
Sri Rahayu ◽  
Dewi Lisnawati

Inventory adalah aktiva yang meliputi barang-barang milik perusahaan, instansi, bidang pendidikan dan lain-lain. PT Anugrah Distributor Indonesia merupakan instansi milik perusahaan teknologi informasi yang didalamnya terdapat bagian logistik. Logistik berfungsi untuk mengelola kegiatan transaksi pembelian dan pengeluaran barang. Pengelolaan tersebut masih memanfaatkan Ms Excel. Sistem ini memakan waktu lama dalam proses pengelolaan data dan tingkat keakuratannya belum maksimal. Untuk memperoleh keakuratan data, logistik membutuhkan suatu sistem yang efisien, efektif dan valid dalam mengelola kegiatan transaksi pembelian dan pengeluaran barang. Dengan demikian dalam penelitian ini peneliti melakukan pengembangan sistem logistik yang saling terintegrasi menggunakan Unified Modelling Language (UML) yang digambarkan dengan Use Case Diagram, Activity Diagram, Sequence Diagram dan Class Diagram dan menggunakan bahasa pemprogramman PHP (Hypertext Preprocessor). Hasil akhir dari penelitian ini adalah sistem informasi inventory stok barang yang sesuai dengan kebutuhan dan memudahkan user dalam menginput dan membuat laporan persediaan barang. Sistem ini dibuat agar proses inventory dapat terkendali dengan baik, menjadi efektif dan efisien. Kata kunci: Sistem inventory, UML, PHP, Sistem Informasi


2019 ◽  
Vol 1 (2) ◽  
pp. 25-33
Author(s):  
Mei Ling Phang ◽  
Swee Huay Heng

Information sharing has become prevalent due to the expansion of social networking in this 21st century. However, electronic devices are vulnerable to various kinds of attacks. Information might be disclosed, modified and accessed by an unauthorised third party which consequently leads to the breach of confidentiality, integrity and availability of the information. Therefore, it is of utmost importance to employ the technology of cryptography and steganography to protect information assets. Cryptography and steganography have weaknesses when they are working alone. Therefore, crypto-steganography, the combination of cryptography and steganography are introduced to overcome the weaknesses in order to provide a double layer of security and protection. This paper provides a general overview of steganography and cryptography as well as a comparison analysis of different crypto-steganographic schemes. A secure crypto-steganographic system for healthcare is then developed with the implementation and integration of the secure crypto-steganographic scheme proposed by Juneja and Sandhu. This healthcare system enables users to store and deliver message in a more secure way while achieving the main goals of both cryptography and steganography.


Author(s):  
L. Ometto ◽  
S. Challapalli ◽  
M. Polo ◽  
G. Cestari ◽  
A. Villagrossi ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document