document properties d 1.3 pu - cordis.europa.eu · been raised with the study and implementation of...

89
Document: FP7-ICT-2011-8-318115-CROWD/D 1.3 Date: March 3, 2015 Security: Confidential Status: Submitted to EC Version: 1.1 Document Properties Document Number: D 1.3 Document Title: Final architecture design Document Responsible: A.Morelli (INCS) Document Editor: A.Morelli (INCS) Authors: Arianna Morelli (INCS) Claudio Bottai (INCS) Fabio Toninelli (INCS) Rohit Goupta (SIG) Vincenzo Mancuso (IMDEA) Arash Asadi (IMDEA) Vincenzo Sciancalepore (IMDEA) Christian Vitale (IMDEA) Sebastien Auroux (UPB) Martin Dr¨ axler (UPB) Antonio de la Oliva (UC3M) Pablo Serrano (UC3M) Target Dissemination Level: PU Status of the Document: Submitted to EC Version: 1.1 Production Properties: Reviewers: Erick Bizouarn (ALBLF), Antonio de la Oliva (UC3M), and Engin Zeydan (AVEA) Document History: Revision Date Issued by Description 1.0 2014-12-27 INCS Submitted to EC 1.1 2015-03-03 INCS Updated section 3.3 Disclaimer: This document has been produced in the context of the CROWD Project. The research leading to these results has received funding from the European Community’s Seventh Framework Programme (FP7) under grant agreement n 318115. All information in this document is provided “as is” and no guarantee or warranty is given that the information is fit for any particular purpose. The user thereof uses the information at its sole risk and liability. For the avoidance of all doubts, the European Commission has no liability in respect of this document, which is merely representing the authors view. CROWD Confidential i Ref. Ares(2015)964381 - 04/03/2015

Upload: others

Post on 11-Sep-2019

5 views

Category:

Documents


0 download

TRANSCRIPT

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    Document Properties

    Document Number: D 1.3

    Document Title:

    Final architecture design

    Document Responsible: A.Morelli (INCS)

    Document Editor: A.Morelli (INCS)

    Authors:

    Arianna Morelli (INCS) Claudio Bottai (INCS)Fabio Toninelli (INCS) Rohit Goupta (SIG)Vincenzo Mancuso (IMDEA) Arash Asadi (IMDEA)Vincenzo Sciancalepore (IMDEA) Christian Vitale (IMDEA)Sebastien Auroux (UPB) Martin Dräxler (UPB)Antonio de la Oliva (UC3M) Pablo Serrano (UC3M)

    Target Dissemination Level: PU

    Status of the Document: Submitted to EC

    Version: 1.1

    Production Properties:

    Reviewers: Erick Bizouarn (ALBLF), Antonio de la Oliva (UC3M), andEngin Zeydan (AVEA)

    Document History:

    Revision Date Issued by Description

    1.0 2014-12-27 INCS Submitted to EC

    1.1 2015-03-03 INCS Updated section 3.3

    Disclaimer:This document has been produced in the context of the CROWD Project. The research leading to these results hasreceived funding from the European Community’s Seventh Framework Programme (FP7) under grant agreementn◦ 318115.All information in this document is provided “as is” and no guarantee or warranty is given that the informationis fit for any particular purpose. The user thereof uses the information at its sole risk and liability.For the avoidance of all doubts, the European Commission has no liability in respect of this document, which ismerely representing the authors view.

    CROWD Confidential i

    Ref. Ares(2015)964381 - 04/03/2015

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    Abstract:This document presents the final CROWD architecture, which is based on the preliminary ar-chitecture released in deliverable D1.1 and that takes into account the requirements that havebeen raised with the study and implementation of CROWD controllers and functionalities forMAC enhancements, backhaul optimization, and connectivity management. The document onlyreports on the architectural changes with respect to the previous release of the CROWD archi-tecture. However, the document provides the reader with an overview of the technical reasonsthat have driven the refinement of the architecture. The APIs developed in the project are alsoreported, for completeness, in the appendix. Moreover, the document includes the disseminationactivities carried out since August 2013, as an update to previous dissemination reports.

    Keywords:

    Control architecture, Energy efficiency, Long Term Evolution, WiFi, small cells, dense networks, HetNets,SDN, SDR

    ii Confidential CROWD

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    Contents

    List of Figures iv

    List of Project Partners vi

    List of Acronyms viii

    Executive summary 1

    Key contributions 3

    1 Introduction 5

    2 Scenarios 72.1 Scenario 1: Self-optimising dense networks . . . . . . . . . . . . . . . . . . . . . . . . 7

    2.2 Scenario 2: Optimised mobility in dense radio access networks . . . . . . . . . . . . . 8

    3 Architecture 113.1 Consolidated architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

    3.2 Interfaces between sub-systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

    3.3 The Controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

    3.4 Applications and MAC-layer enhancements . . . . . . . . . . . . . . . . . . . . . . . 16

    3.5 Backhaul and long-term radio configuration . . . . . . . . . . . . . . . . . . . . . . . 22

    3.6 Connectivity management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

    3.7 Feedback on real test-bed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

    4 Dissemination activities 294.1 Journals and Magazines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

    4.2 Conferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

    4.3 Tutorials & Panels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

    4.4 Posters & Demo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

    4.5 Standardization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

    4.5.1 IEEE 802.1cf (OMNIRAN) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

    4.5.2 IEEE 802.21d . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

    4.5.3 IEEE 802 EC Privacy Recommendation SG . . . . . . . . . . . . . . . . . . . 33

    4.5.4 IETF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

    4.6 Editorial Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

    4.7 Media and Representation Activities . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

    4.8 Submitted/Accepted in the next period . . . . . . . . . . . . . . . . . . . . . . . . . 35

    5 Conclusion 37

    A CLC Northbound interfaces 41A.1 OpenDaylight CLC CROWD northbound REST Interfaces . . . . . . . . . . . . . . 41

    CROWD Confidential iii

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    B CLC Southbound interfaces 61B.1 OpenDaylight CLC CROWD southbound Interfaces . . . . . . . . . . . . . . . . . . 61B.2 Interfaces and primitives for Long Term Evolution (LTE) . . . . . . . . . . . . . . . 66B.3 Interfaces and primitives for WiFi . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71

    C CRC Northbound interfaces 75

    Bibliography 79

    iv Confidential CROWD

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    List of Figures

    2.1 Illustration of Scenario 1: network components involved in self-organization operation. 82.2 Illustration of Scenario 1 in case of low offered load. . . . . . . . . . . . . . . . . . . 92.3 Illustration of Scenario 2: network components involved in connectivity management

    operation with mobility optimisation. . . . . . . . . . . . . . . . . . . . . . . . . . . 10

    3.1 CROWD network architecture. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123.2 CLC: OpenDayLight extention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143.3 LTE modules in the Local Controller . . . . . . . . . . . . . . . . . . . . . . . . . . . 153.4 CRC: CROWD CLCManager modules . . . . . . . . . . . . . . . . . . . . . . . . . . 163.5 Dynamic behaviour of CROWD Almost Blank Subframe technique (CABS) in a

    network with 7 base stations and Almost Blank Sub-Frame (ABSF) patterns of 70subframes. At the beginning there are only 10 users per base station in the network,whereas the number of users is doubled abruptly after 230 subframes. . . . . . . . . 17

    3.6 Example of network architecture with cluster-based Device to Device (D2D) relay (Dual Radio Opportunistic Networking for Energy Efficiency (DRONEE)). . . . . . . 18

    3.7 Average per-user throughput and energy efficiency with DRONEE in network with4 clusters consisting of 2, 4, 6, and 8 users, respectively. . . . . . . . . . . . . . . . . 18

    3.8 Schematic representation of overlay inband, underlay inband, and outband D2D forcellular scenarios. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

    3.9 Comparison of D2D mode selection schemes in terms of the impact of user populationon the system performance with fully backlogged queues (achievable performance):aggregate cell throughput. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

    3.10 Comparison of D2D mode selection schemes in terms of the impact of user populationon the system performance with fully backlogged queues (achievable performance):aggregate cell power. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

    3.11 Example of wired resource distribution for dense cellular networks with access andbackhaul elements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

    3.12 User throughput distribution under different user association policies (with 100 basestations, 80 users, backhaul capacity fixed to 500 Mbps, and Signal to Noise Ratio(SNR)min = -7 dB). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

    3.13 User throughput distribution under different user association policies (with 100 basestations, 80 users, backhaul capacity fixed to 500 Mbps, and SNRmin = 5 dB). . . . 22

    3.14 Backhaul network reconfiguration and FCPF architecture . . . . . . . . . . . . . . . 243.15 Refined Connectivity Management Sub-module architecture . . . . . . . . . . . . . . 243.16 LTE MAC/PHY SDN Architecture for CLC controlling eNBs. . . . . . . . . . . . . 263.17 LTE eICIC/ICIC Prototyping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

    4.1 Media Lunch Coverage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

    CROWD Confidential v

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    vi Confidential CROWD

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    List of Project Partners

    Name Acronym Country

    Intecs S.p.A. (coordinator) INCS Italy

    Alcatel-Lucent Bell Labs France ALBLF France

    Fundacion IMDEA Networks IMDEA Spain

    National Instruments SIG Germany

    Universidad Carlos III de Madrid UC3M Spain

    Universitaet Paderborn UPB Germany

    AVEA Iletisim Hizmetleri AS AVEA Turkey

    CROWD Confidential vii

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    viii Confidential CROWD

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    List of Acronyms

    ABSF Almost Blank Sub-Frame

    AP Access Point

    API Application Programming Interface

    BS Base Station

    BWA Broadband Wireless Access

    CABS CROWD Almost Blank Subframe technique

    CLC CROWD Local Controller

    CL(WRR) Cluster-based Weighted Round Robin

    CL(MR) Cluster-based Max Rate

    CRC CROWD Regional Controller

    CROWD Connectivity management for eneRgy Optimised Wireless Dense networks

    D2D Device to Device

    DMM Distributed Mobility Management

    DMM-GW Distributed Mobility Management Gateway

    DRONEE Dual Radio Opportunistic Networking for Energy Efficiency

    eICIC enhanced Inter-Cell Interference Coordination

    eNB evolved NodeB

    HeNB Home evolved NodeB

    IP Internet Protocol

    KPI Key Performance Indicator

    JSON JavaScript Object Notation

    LTE Long Term Evolution

    MAC Medium Access Control

    MN Mobile Node

    MNO Mobile Network Operator

    NB North-Bound

    CROWD Confidential ix

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    ODL OpenDaylight

    OF OpenFlow

    PF Proportional Fair

    PoA Point of Attachment

    QoE Quality of Experience

    RAN Radio Access Network

    RAT Radio Access Technology

    REST REpresentational State Transfer

    RR Round Robin

    RSRP Reference Signal Received Power

    SB South-Bound

    SDN Software Defined Network

    SINR Signal to Interference plus Noise Ratio

    SNR Signal to Noise Ratio

    UE User Equipment

    WLAN Wireless Local Area Network

    x Confidential CROWD

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    Executive summary

    The purpose of this document is to present the consolidated Connectivity management for eneRgyOptimised Wireless Dense networks (CROWD) architecture, detailing the key functionalities andthe modules implementing them. The architecture presented is the evolution of the preliminarydesign described in [1] and it takes into account the modifications needed due to MAC enhancement,connectivity management and dynamic reconfiguration studies performed.

    A flexible architecture to accommodate the requirements of the extremely dense scenario, whichwill conform future access networks, has been the goal of the overall project and each piece of workcarried out in the project has been steered accordingly.

    The concept of Software Defined Network (SDN) has been confirmed and definitely incorporatedin the architecture to make available the development of several intelligent modules able to providethe functionalities required in dense deployments.

    CROWD’s goals about network cooperation, dynamic network configuration and improved ca-pacity tuning have been confirmed and studied in distinct work packages, under the perspective ofthe common SDN-based framework. The main goal of this document is to describe the conclusion,in architectural terms, of this study.

    Starting from the description in [1] we have consolidated the proposal to adopt controllers intwo layers, with different roles: the CROWD Local Controller (CLC) and the CROWD RegionalController (CRC). We have identified OpenDayLight as the framework to exploit and integrate todevelop the CROWD controllers. The CLC is proposed for efficient utilization of resources via mech-anisms operating at short time scale, whereas the CRC optimises the radio resources availability interm of energy efficiency and capacity improvement on longer time scales. CROWD leverages theSDN to design the above mentioned controllers. Specifically, on the one hand, CROWD controllersexploit Southbound interfaces towards WiFi, LTE and backhaul links to i) collect real-time mea-surements, and ii) issue commands to the network devices. On the other hand, CROWD controllersexpose Northbound interfaces towards applications acting as policy decision points. Moreover toguarantee the Quality of Experience (QoE) to the users and improve the connectivity manage-ment, the Distributed Mobility Management Gateway (DMM-GW) is studied and integrated inthe CROWD SDN-based architecture.

    This document explores the significant modification proposed for the revised CROWD architec-ture with respect to the preliminary architecture described in [1], according to the outcome of thetechnical work packages, and considering the preliminary results on testbed integration, which isone of the most important achievements expected in CROWD.

    Finally the document explores the dissemination activities performed since August 2013, as anupdate on previous dissemination reports, including several journal and conference papers publishedin top venues, a number of demos and contributions to standardization activities.

    CROWD Confidential 1

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    2 Confidential CROWD

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    Key contributions

    The main technical contributions of this deliverable are as follows:

    • Description of key challenging scenarios for the control of resource utilization and connectivityin very dense and heterogeneous wireless networks;

    • Description of CROWD controllers and their SDN-style APIs for controlling LTE, WiFi andHetNets in general;

    • Definition of the consolidated architecture for CROWD;

    • Overview of the most relevant technical achievements in the design of network functionalitiesfor MAC enhancements, backhaul optimization, an connectivity management;

    • Overview of testbed integration activities in view of the final demonstration of CROWDarchitectural features;

    • Analysis of the first results on the real integrated testbed;

    • Report on dissemination activities.

    The key contributions to the research and standardisation communities resulting from the workperformed within the aforementioned activities are the following:

    • Nine journal papers, specifically, one article in IEEE Transactions on Vehicular Technology,one in IEEE Surveys and Tutorials on Communications, one in ACM Computer Communica-tion Review, one in IEEE Communications Magazine, one in IEEE Wireless CommunicationsMagazine, two in Elsevier ComCom, one in Elsevier ComNet, and one in Elsevier Ad HocNetworks;

    • Twenty-one conference papers, among which one paper in IEEE INFOCOM, one in IEEEWoWMoM, one in ACM MSWiM, one in IEEE/ACM COMSNETS, and one in IFIP WirelessDays;

    • Nine tutorials and panels;

    • Six posters and demos;

    • Seven contributions to the standardisation of IEEE 802.1cf;

    • Eight contributions to the standardisation of IEEE 802.21d;

    • Three contributions to IEEE 802 EC Privacy Recommendation SG;

    • Seven IETF contributions (internet drafts).

    CROWD Confidential 3

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    4 Confidential CROWD

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    1 Introduction

    CROWD had released a preliminary architecture for the control of access and backhaul resources ofvery dense wireless networks with strong support for connectivity management in [1]. Since then,the project has studied practical solutions for an SDN-like implementation of the architecture, andhas refined the basic mechanisms proposed to enhance the efficiency of the system Key PerformanceIndicators (KPIs), such as spectrum utilization, energy efficiency, user fairness, handover delay, etc.The architecture has been then refined with the feedback received from such activities.

    Indeed, CROWD controllers have been implemented by adapting and integrating SDN-orientedplatforms, and control applications have been coded in accordance with the architectural function-alities identified with the study of solutions for MAC enhancements, backhaul optimization, andconnectivity management.

    CROWD’s goals about network cooperation, dynamic network configuration and improved ca-pacity tuning have been studied in distinct work packages, under the perspective of the commonSDN-based framework. However, while the technical details that have driven the refinement of thearchitecture will be reported in other specific deliverables, here we present an overview of scenariosand functionalities identified in other work packages of the project to support high performancein very dense and heterogeneous wireless networks. In fact, the main goal of this document is todescribe the conclusion, in architectural terms, of these studies. Moreover, we only report on thearchitectural changes with respect to the previous release of the CROWD architecture, whereasmany details on the architecture and the control Application Programming Interfaces (APIs) re-mained unchanged and can be found in [1]. However, the document includes an overview of thetechnical reasons that have driven the refinement of the architecture, and a listing of the APIsdeveloped in the project is also reported in the appendix.

    Starting from the description in [1] we have consolidated the proposal to adopt controllers intwo layers, with different roles: the CLC and the CRC. We have identified OpenDayLight as theframework to exploit and integrate to develop the CROWD controllers. The CLC is proposed forefficient utilization of resources via mechanisms operating at short time scale, whereas the CRCoptimises the radio resources availability in term of energy efficiency and capacity improvement onlonger time scales. CROWD leverages the SDN to design the above mentioned controllers. Specifi-cally, on the one hand, CROWD controllers exploit Southbound interfaces towards WiFi, LTE andbackhaul links to i) collect real-time measurements, and ii) issue commands to the network devices.On the other hand, CROWD controllers expose Northbound interfaces towards applications actingas policy decision points. Moreover to guarantee the QoE to the users and improve the connectiv-ity management, i.e. mobility, the concept of Distributed Mobility Management (DMM) is studiedtogether with its integration in the CROWD SDN-based architecture. Preliminary testbeds havebeen deployed to test the various techniques proposed in the project, starting with the feasibilityof the two-tiered control architecture proposed in CROWD.

    A flexible architecture to accommodate the requirements of the extremely dense scenario, whichwill conform future access networks, has been the goal of the overall project and each piece ofwork carried out in the project has been steered accordingly, including dissemination. Indeed, thedocument explores the dissemination activities performed since the beginning of the project, whichincludes several journal and conference papers published in topi venues, a number of demos andcontributions to standardization activities.

    The rest of the document is organized as follows. Chapter 2 presents the basic scenarios for which

    CROWD Confidential 5

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    the CROWD architecture has been designed. Chapter 3 highlights the refinements introduced inthe CROWD architecture after its preliminary release and the technical motivations that drove thearchitectural design. Chapter 4 reports on the dissemination activities carried out in the project.Finally, Chapter 5 summarizes and concludes the document.

    6 Confidential CROWD

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    2 Scenarios

    In this chapter we describe the two references scenarios distilled from the objectives of the projectand reviewed according to the design of the architecture. The controllers, regional and local, worka fundamental role in the project. The need of coordination and management of a large numberof point of access, also considering the heterogeneity of the technologies, promote the controllersas the key element to reach the objectives of exploiting, supervising and managing heterogeneousdense networks. The controllers collect information coming from the lower layer and abstract themfor the higher layer (bottom-up). Here the applications can take decisions and the controllers areable to enforce them in the network (top-down).

    2.1 Scenario 1: Self-optimising dense networks

    Scenario 1 depicts a new generation mobile Broadband Wireless Access (BWA) network includinghot spots with a very high density of heterogeneous access points (e.g., WiFi Access Points (APs)and LTE Home evolved NodeBs (HeNBs)). Very high density means that the number of basestations has the same order of magnitude as the number of user terminals. Users equipped with asingle-radio terminal may connect to any of the reachable access networks, whose number is evenincreased if the mobile device is equipped with multiple radios of different technologies. For allthe access points under the control of a single operator, dedicated controllers optimise the RadioAccess Network (RAN) and backhaul network, to increase network capacity, QoE and achieveenergy efficiency.

    In this scenario we pursue the following objectives:

    1. Increase network capacity.

    2. Achieve energy consumption proportional to traffic load.

    The scenario is illustrated by means of Fig. 2.1. As can be seen, coverage is provided by severalbase stations that are heterogeneous in type (LTE vs. WiFi) and range (macro vs. pico vs. small).This creates the need for optimisation and coordination, which may happen either at a local scopeor with a broader view. Here the controllers carry out their task: they can take decision basedon the collected information or receive decisions from the application layer with the objective, forexample, to minimise the number of handover rather than to perform offloading of the cellularnetwork (D2D) or, even, minimise energy consumption playing on the user association.

    Two examples of dynamic reconfiguration are reported in the right part of Fig. 2.1:

    • optimised association of LTE User Equipments (UEs): A is detached from eNB1, which isclosest and with highest Signal to Interference plus Noise Ratio (SINR), and attached toeNB2 instead, possibly because the latter is less occupied than the former, or it enjoys morelightly loaded backhaul or any other reason that cannot be realised by eNB1 and A by meansof a stand-alone optimisation.

    • LTE offloading to WiFi: B is detached from its serving LTE eNB3 and it becomes associatedto WiFi AP1, which requires inter-Radio Access Technology (RAT) hand-over. While thisoperation can be implemented easily within the Mobile Node (MN), as it is today, in this

    CROWD Confidential 7

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    LTE pic

    o-cell

    LTE macro-cell

    Internet / EPC

    Small cell (LTE HeNB, WiFi AP) A

    eNB2

    B

    eNB1

    eNB3AP1

    CLC CLC CLC

    CRC

    Figure 2.1: Illustration of Scenario 1: network components involved in self-organization operation.

    scenario the operation is assisted by the Mobile Network Operator (MNO), since it can takeinformed decisions aiming at global objectives.

    An additional benefit of the proposed scenario is energy consumption reduction:

    • the backhaul network elements are reconfigured dynamically, they optimise the network re-source usage and, indirectly, the power consumption because less hardware is required toachieve the same level of performance;

    • base stations can be automatically switched on and off, which has a direct effect on powerconsumption.

    The latter is also illustrated by means of the example in Fig. 2.2, which shows the same network asFig. 2.1 but with a lower load / density of users, e.g., because the snapshot is taken during nighttime. Thanks to a broad view optimisation process, the overall power required by the MNO tooperate the network can be reduced significantly.

    2.2 Scenario 2: Optimised mobility in dense radio access networks

    In Scenario 2 we consider the same mobile BWA network with very high density of access pointsas in Scenario 1, but we focus on mobile nodes exploiting network-terminal cooperation to selectthe most appropriate technology and access point. We consider a urban area with high densityof Point of Attachments (PoAs) and heterogeneous technologies (LTE and WiFi). Mobile nodes

    8 Confidential CROWD

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    LTE pic

    o-cell

    LTE macro-cell

    Small cell (LTE HeNB, WiFi AP)

    Internet / EPC

    CLC CLC CLC

    CRC

    Figure 2.2: Illustration of Scenario 1 in case of low offered load.

    roam around and network-terminal cooperation is required in order to optimise the connection.Cooperation among mobile users and among multiple mobile network accesses is also considered.Inter-RAT and LTE to/from WiFi mobility may occur for multi-homed mobile nodes.

    In this scenario we pursue the following objectives:

    1. Optimise technology selection in terms of a telecom operator objective function, e.g., maximisecapacity or minimise energy efficiency, while keeping a satisfying user’s QoE.

    2. Hand-over of user’s terminal traffic from the cellular to the WiFi access networks (offload)management.

    3. Opportunistic network selection.

    Again the controllers help in performing these objectives allowing the collaboration betweendifferent technologies, as from the controller perspective the technology is abstracted according tothe SDN paradigm.

    The scenario is illustrated by means of Fig. 2.3. As the density of base stations increases, so doesthe frequency of hand-overs, until the deployment of new PoAs is not beneficial anymore, but ratherit causes inconvenience due to high signalling overhead. In CROWD we address this challenge by:i) defining new schemes for intra-RAT local mobility management, which are scalable by design andcan be seamlessly integrated within the existing LTE and Wireless Local Area Network (WLAN)networks; and, ii) developing new telecom operator assisted mechanisms for inter-RAT hand-over,i.e., offloading. Therefore, in this scenario the MN is transparently associated to the best PoA,

    CROWD Confidential 9

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    Internet

    EPC

    Information repositories

    LTE eNB WiFi APMulti-radioterminal

    eNB1

    AP1

    AP2

    AP3

    eNB2

    CLCCLC

    CRC

    Figure 2.3: Illustration of Scenario 2: network components involved in connectivity managementoperation with mobility optimisation.

    from the point of view of the MNO, which has the information and incentive to perform network-wide optimisation in terms of, e.g., capacity or energy consumption. Furthermore, the MN roamsthrough the different networks without losing its active connections, so that make before breakhand-over is realised also in the case of association to a network with a different wireless accesstechnology.

    10 Confidential CROWD

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    3 Architecture

    In this chapter we describe the consolidate architecture designed in CROWD as conclusion of theTask 1.1 activities.

    We provide an overview of the proposed architecture in Section 3.1, with a focus on the interfacesof the proposed sub-systems in Section 3.2. Section 3.3 describes the CROWD controllers, whereasa more detailed description of the architecture functionalities is then reported in Section 3.4 forMAC-layer enhancements (WP2), in Section 3.5 for the backhaul and long-term radio configuration(WP3), and in Section 3.6 for connectivity management (WP4). Finally the feedback on the realtest-bed about the real feasibility of the mechanisms developed is shown in Section 3.7

    3.1 Consolidated architecture

    As introduced in D1.1, LTE and WiFi are the technologies expected to have the highest penetrationin mass deployment in the future networks. In order to manage different technologies just to exploitdiversity as a resource rather than a limitation,intellingent elements that have a complete view ofthe network deployment is needed. Taking the decision to force handover from one cell to anotheror to perfom the off-loading of a cell, has to be managed to to optimise the resource allocation.We proposed a two-tiers architecture, with two-tiers SDN controllers, the CLC and the CRC . Thetwo controllers work in different timescales,taking the decision in short or medium-long timescale,respectively. The controller is one of the key elements of CROWD SDN-based architecture. Weidentified in OpenDaylight (ODL) the framework on which developing most of functionality of boththe CLC and CRC, while certain mobility related functionality is implemented using the Ryu SDNcontroller (for simplicity). A detailed description of the evolution of ODL to CROWD Controlleris provided in Section 3.3

    As introduced in [1], to tackle the challenges of the scenarios described in Chapter 2, we identifiedthe district which consist in base station, LTE and WiFi AP, and interconnecting backhaul linksreconfigurable via OpenFlow (OF) where the CLC works and enforce the decision in a short-timescale, and the region as a logical area including several district and where the CRC operatesin medium-long timescale. The optimisation in the network is performed by application that run ontop of the controllers. They are connected with CLC or CRC by the North-Bound (NB) interfaces.Some of the NB interfaces are shared among the applications, as they are more general than others,some other are specifically built and tailored on the application. In the figure Fig. 3.1 the South-Bound (SB) are also shown as interconnection between the controllers and the new and old networkelements.

    In the following section the interfaces between subsystems are illustrated.

    3.2 Interfaces between sub-systems

    In D2.2, D3.2 and D4.2 an exhaustive description of the NB and SB interfaces has been provided.For completeness the identical list is reported in Appendix. Moreover, according to the implemen-tation, some changes occurred. Hereby we provide the list of major modification in NB and SBinterfaces.

    CROWD Confidential 11

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    X2

    UuIEEE 802.11

    HeNB eNB WiFi AP

    IP

    New interface Existing interface

    WiFi District

    X2

    LTE District

    `

    ANDSF IEEE 802.21 MIIS ALTO Server

    Information repositories

    Operator services(IMS, HSS, AAA)

    Northbound APISouthbound API

    IP

    Northbound APISouthbound API

    NB-CLC NB-DMM NB-WiFi

    SB-WiFi SB-OF

    Connection

    IF 1 IF2

    X2

    NB-LTE NB-DMM NB-CLC

    SB-OFSB-LTE

    Internet

    CROWD element

    Northbound APISouthbound API

    Region

    Backhaul

    Backhaul

    LTE accessselection

    CLC

    DMM GW

    CRC

    DMM session store

    DMM GW

    S1-U

    S1-U

    S1-U

    S1-U S1

    -U

    S1-US1

    -U

    NB-CRC

    Dynamic Backhaul Reconfiguration

    SB-OF SB-OPSB-CLC

    Manager

    \\

    ABSF WLAN Optimisation

    D2DOffloading

    D2DOffloading

    Power Cycling

    Figure 3.1: CROWD network architecture.

    NorthBound Interfaces

    Regarding the NB interfaces syntax modification occur.

    Firstly we removed from the set of NB interfaces all the interfaces already existing in ODL,related to the switches and flows information:

    • removed /directory/backhaul. It is replaced by SwitchManager ODL standard interface

    • removed /directory/traffic flows. It is replaced by FlowProgrammer ODL standard interface

    • removed /network elements/flows. It is replaced by FlowProgrammer ODL standard interface

    Some interfaces has been removed as the information they carried on, have been included in thefields of other new or existing interfaces:

    • replaced /network element/UE/{id}/Handover (PUT)with /mobile device/handover/{host ip}/{src id}/{dest id}.

    • replaced /network element/UE/{id}/Handover (GET)with the field signal in /mobile device/{host ip}/channel state.

    Moreover, additional interfaces are developped to manage WiFi statistics information:

    12 Confidential CROWD

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    • /network element/WiFi/{id}/bw stats?date={value}&duration={value}

    • /network element/WiFi/bw stats

    • /network element/WiFi/{id}/ld stats?date={value}&duration={value}

    • /network element/WiFi/ld stats

    SouthBound Interfaces

    The complete list of the SB interfaces of the CLC are reported in Appendix B.1. The majormodifications are related to additional interfaces that occurred as

    • ABSF message

    • MCS message

    • State message

    • Change State message

    3.3 The Controller

    During the lifetime of the project several controllers have been studied and a deep analysis hasbeen carried out to understand how we could use and improve the existing platforms to be fittedin CROWD. We looked at controllers like Pox and Nox, Beacon, Ryu, Floodlight and FlowVisorand at frameworks like Opendaylight and OpenNaas. We selected Opendaylight for three reasons:

    • software architecture: the software components are close to the architectural functional blocksproposed in CROWD;

    • market impact: from the market impact point of view, we believed that Opendaylight frame-work paves the way of SDN paradigm introduction in the main stakeholders business plan;

    • custom implementation: SDN is not limited to any single protocol. This allows to improveand customize the framework.

    The structure of OpenDayLight (ODL) platform fits the main elements of CLC very well. Firstof all it offers a layered architecture in which northbound interfaces enable the applications, whichrun on top of the controller, to interact with the network elements. Secondly, the Base NetworkService Functions fulfill the requirements for Discovery and Collector functionalities: all the networkdevices are discovered, collected and monitored by this part of the framework. Thirdly, the ServiceAbstraction Layer contains a sort of database where all the information that comes from thelower layer are stored. Finally, southbound interfaces, e.g. OpenFlow, allow to interface differentnetwork devices to the same framework. ODL is based on OpenFlow, although it is extensible tosupport other SDN open standards (I2RS, VxLAN, etc.). We believe that developing the CROWDcontroller based on ODL allows the project to be aligned with the mainstream design of futurenetworks. Indeed, the SDN approach has had great success and has attracted the attention ofservice providers and stakeholders interested to enable new services and capabilities and extendthe life of existing infrastructures.

    We begun with the development of CROWD components by using the Hydrogen version of ODLreleased in February 2014, and have later stepped to the latest Helium release. Therefore, bothCLC and CRC are ODL-based. The details of the modification and the behaviour of the two typesof CROWD controllers are reported in this section.

    CROWD Confidential 13

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    Figure 3.2: CLC: OpenDayLight extention

    CLC

    The CLC aims to manage the network devices that populate the district where the controlleris located. The scenario we are referring to is a heterogeneous network, where LTE and WiFItechnologies coexist and share backhaul switches. Due to the multitude of technologies we plannedto adopt an existing OpenFlow plugin to interface Openflow switches with controllers, and developadditional plugins for LTE and WiFi points of access.

    In Fig. 3.3 the modules developed in ODL for LTE technology are shown. The same structure isused for the WiFi too. Northbound and Southbound interfaces are described in Section 3.2. Herethe Core service layer modules are shown:

    • LTE manager: it manages the information coming from the Topology, Inventory an UEtracker.

    • LteManager Interface: its role is to translate the NB interface and use the module of the core.

    • IDataPacket Service: to translate the information from/to the SB interfaces and send/receivethe command to/from the core.

    • Inventory: this module works together with SAL of ODL and extract the information needed.

    • Topology: this module works together with Topology Manager of ODL, in the Base networkService Function, and takes the information needed.

    14 Confidential CROWD

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    Lte SBPlugin

    NB REST API

    OtherPlugins

    CoreService

    LteServices

    Lte REST API

    LTENorthboundManager

    LteManager

    IPluginInDataPacketService

    IDataPacketService

    Inventory

    Topology

    UeTracker

    NetService

    NetProtocolImpl

    LteManager Interface

    Figure 3.3: LTE modules in the Local Controller

    • UE tracker: this module works together with Host Tracker of ODL and takes the informationrelated to the UE connected to LTE.

    CRC

    Based on our two-tier architecture, the main tasks of the CRC are to manage the CLCs anddistricts inside its region and to give the applications, running on top of it, access on a regionalscope. Consistently with the operation of CLCs, also the CRC uses an existing OpenFlow pluginof ODL to control OpenFlow-enabled devices on a regional scope. Besides, to allow access to theAPIs of the CLCs inside the region and to control the CLC instances, we have developed a new setof modules for ODL called CLCManager.

    The modules of the CLCManager are shown in Fig. 3.4 and the Northbound and Southboundinterfaces are described in Section 3.2:

    • CLCManager Interface: translates between the NB interface and the core modules.

    • CLCManager Service: handles commands and function calls to the core plugin.

    • CLCManager Plugin: manages the CLC inventory

    • Inventory: stores the actual CLC inventory.

    • CLCConnector: handles the communication with the CLCs

    CROWD Confidential 15

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    CRCPlugins

    NB REST API

    OtherPlugins

    CoreService

    CRCServices

    CRC REST API

    CLCManagerService

    Inventory

    CLCManager Interface

    CLCManagerPlugin

    CLCConnector

    Figure 3.4: CRC: CROWD CLCManager modules

    3.4 Applications and MAC-layer enhancements

    The CROWD architecture and its controllers can be leveraged to push network performance towardsthe 1000× improvement in capacity and density targeted for 5G networks. Moreover, the modularand flexible controllers proposed in CROWD can be used to build new services in short time andto quickly reconfigure the network in negligible time, as per 5G objectives.

    In general, CROWD offers algorithms and software for enhanced wireless mechanisms, which canbe used not only to benchmark novel 5G proposals, but also to derive novel density-aware network-ing approaches. In particular, from an architectural point of view, CROWD proposes a few keynetwork control functions to enhance the efficiency of wireless MAC mechanisms: (i) the distributedcontrol of the ABSF mechanism for enhanced Inter-Cell Interference Coordination (eICIC), (ii) theoptimization of D2D communications for cellular offloading, opportunistic spectrum utilization, andscheduled relay of traffic for devices with poor channel quality, and (iii) the optimization of user(re-)association mechanisms in presence of multiple access choices, including when multiple wirelesstechnologies are available to connect to the network (i.e., with vertical handover).

    As concerns eICIC, efficient and lightweight control of ABSF has been designed by using gametheory and optimization techniques. We started with the design of a centralized [2] approach,and then we have studied the possibility to exploit the cooperation between base stations to makeour approach more practical and really implementable in commercial networks. Specifically, wepropose to delegate each base station to decide which set of users have to be scheduled in eachsubframe. Based on those decisions, each base station builds its ABSF pattern which is announcedto the neighbor in a round robin fashion. However, we impose an upper limit to the number ofsubframes that each base station can use in a given time horizon. Such limit is dynamically adjustedby the central controller, i.e., CLC, using an additive increase multiplicative decrease mechanism,which has been largely proved to be optimal for such problems. The controller properly tracksdynamic changes occurred in the offered load experienced in the network. We call our scheme

    16 Confidential CROWD

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    0 100 200 300 4000

    5

    10

    15

    20

    ABSF patterns [#]Agg

    rega

    te m

    inim

    um u

    ser

    rate

    η [k

    bits

    /TT

    I]

    Optimum CABS No ICIC

    Figure 3.5: Dynamic behaviour of CABS in a network with 7 base stations and ABSF patterns of70 subframes. At the beginning there are only 10 users per base station in the network,whereas the number of users is doubled abruptly after 230 subframes.

    CABS. Fig. 3.5 shows an example of dynamic adaptation of ABSF patterns as the number ofusers per base station is increased from 10 to 20 in a network with 7 base stations, Interestingly,CABS quickly reacts to network changes and achieves much better results than legacy solutions(“No ICIC” in the figure). CABS offers a good trade-off between complexity and performance.In fact, the “Optimum” reported in the figure, which represents the best performance achievablewith ABSF, is not far from what achieved with CABS, although it imposes an exponentially highercomplexity and requires a much higher signaling overhead. Interestingly, CABS only requires toannounce ABSF patterns in form of short bitstreams, while the computation of the optimal solutionrequires a perfect knowledge of the channel quality reported by each user in the network, whichmust be transferred to a central controller. Note that in CABS, the role of the controller onlyconsists in dynamically regulating the maximum number of subframes that each base station mightschedule.

    As concerns the optimization of D2D strategies, CROWD has developed architectural solutionsfor enhancing both WiFi and LTE-based systems by means of opportunistic and smart relay mech-anisms [3, 4].

    Fig. 3.6 depicts a scenario in which the users are organized in clusters and the cellular traffic isrelayed by means of cluster heads using WiFi Direct within the cluster. For such scenario, Fig. 3.7shows an example of throughput and energy efficiency gain that can be achieved with D2D relayof traffic in LTE networks. The relay scheme developed in CROWD is called DRONEE, and itis based on bridging LTE and WiFi Direct on mobile user’s devices and using clusters of usersfor scheduling operations [5, 6]. The figure shows that users receive the lowest throughput underRound Robin (RR) because they are scheduled irrespective of their channel quality. The Propor-tional Fair (PF) scheduler has much better performance than RR, but is significantly outperformedby CROWD schemes Cluster-based Weighted Round Robin (CL(WRR)) and Cluster-based Max

    CROWD Confidential 17

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    Figure 3.6: Example of network architecture with cluster-based D2D relay (DRONEE).

    1

    1.5

    2

    2.5

    3

    3.5

    4

    4.5

    RR PF CL(WRR)CL(MR) RR PF CL(WRR)CL(MR)

    Thro

    ughput [M

    bps]

    Effic

    iency [M

    b/J

    ]

    Throughput Efficiency

    EfficiencyThroughput

    Figure 3.7: Average per-user throughput and energy efficiency with DRONEE in network with 4clusters consisting of 2, 4, 6, and 8 users, respectively.

    Rate (CL(MR)), which user RR and Max Rate allocate resources to clusters rather than to users.CROWD D2D schemes are advantageous also in terms of energy efficiency, although they requirethe use of two wireless interfaces per mobile node (LTE and WiFi).

    Similarly, opportunistic relay has been also proposed to solve the performance anomaly problemof 802.11 networks, that is exacerbated in dense deployments as soon as at least one user per accesspoints receive significant interference. In this case, WiFi Direct is used to offload WiFi accesspoints. In particular, CROWD solution for this problem leverages on the flexibility of wirelesstopologies and relay scheduling, i.e., on how the relays split time between downstream nodes theyrelay for and upstream flows to access points. Our results, illustrated in [4], show significant gainsin terms of network throughput performance (more than doubling it) and power consumption (upto 75% reduction)

    Moreover, we have studied alternative technologies to implement opportunistic relay schemes,

    18 Confidential CROWD

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    Unlicensed!

    band!

    Licensed!

    band!

    Underlay Overlay Outband

    Fre

    quen

    cy!

    Cellular!D2D!Cellular!

    D2D!Cellular!

    D2D!

    Figure 3.8: Schematic representation of overlay inband, underlay inband, and outband D2D forcellular scenarios.

    and in particular we have explored how to optimize D2D mode selection [7]. Indeed, the significanceof the potential D2D gain had led to proposals in which a part of the cellular resources is dedicatedonly to D2D communications (i.e., inband overlay D2D mode), while the scarcity and the highprice of cellular spectrum motivated some researchers to explore D2D communications over theunlicensed band (i.e., outband D2D mode). These D2D modes are schematically illustrated inFig. 3.8. In CROWD, we propose an adaptive D2D mode selection by eliminating the existing biastowards specific D2D mode or operating band. In particular, based on the practical implicationsof each D2D mode based on the latest standard releases of LTE-A and WiFi-Direct, we findthat there is no superior D2D mode and the potential of each mode is highly scenario/use-casedependent. Moreover, based on our analytical study, we proposed an innovative multi-mode multi-band setup, which accounts for both achieved throughput and energy costs. We call such a novelapproach Floating Band D2D, because D2D transmissions can occur on either inband or outbandmodes. However, since the optimization problem in Floating Band D2D is NP-hard, we proposecomputationally feasible 3 heuristics (namely, Social, Greedy and Ranked). For the details onanalysis and optimization we refer the reader to [7]; here we just report an example of potentialgain due to Floating Band D2D.

    Figs. 3.9 and 3.10 illustrate the impact of the user population size N on achievable systemperformance when 30% of radio resources can be dedicated to inband D2D in a single cell LTE-Ascenario. The results reported in the figure pertain to a reference cell, i.e., an average behaviorof a macro-cell surrounded by other macro-cells. Error bars in the results are the 95% confidenceintervals. Cellular users are scheduled according to the PF algorithm.

    In addition to our heuristics, we evaluate three benchmark schemes, namely, Forced-LTE, Forced-WiFi,and Optimal. In Forced-LTE, D2D users are forced to use legacy cellular communications (i.e.,mode 0). In Forced-WiFi, D2D users are forced to communicate over WiFi (i.e., mode 3). Optimalresults are based on the exact solution to the mode selection problem. The benchmark schemesprovide the means to compare our proposals with the legacy cellular system, to measure the gaindue to extra WiFi bandwidth, and to see how far the heuristics are from the optimal decision.

    We can observe the achievable throughput in Fig. 3.9. The aggregate throughput has a negligiblechange with N under Forced-LTE, because the density of users does not change the distributionof channel qualities in the cell, and therefore the average aggregated throughput. The throughputof the rest of schemes increases with N because there are probabilistically more D2D pairs in adenser cell, hence D2D throughput is higher. In Forced-WiFi, the throughput grows slowly dueto the contention-based nature of WiFi, in which the MAC overhead increases with the numberof contending users. Since some of the outband D2D pairs do not interfere with each other (i.e.,they are more distant than 150 m), the aggregate throughput of Forced-WiFi in our experimentsreaches up to 98 Mbps. More importantly, not only the simple proposed heuristics greatly out-perform Forced-LTE and Forced-WiFi, but they also perform very close to Optimal (due to the

    CROWD Confidential 19

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    0

    50

    100

    150

    200

    250

    300

    350

    5 10 20 30 40 50 60 70 80 90 100

    Thro

    ughput [M

    bps]

    Number of users per cell (N)

    Forced-LTEForced-WiFi

    SocialGreedy

    RankedOptimal

    Figure 3.9: Comparison of D2D mode selection schemes in terms of the impact of user popula-tion on the system performance with fully backlogged queues (achievable performance):aggregate cell throughput.

    0

    20

    40

    60

    80

    100

    120

    140

    160

    5 10 20 30 40 50 60 70 80 90 100

    Pow

    er

    [W]

    Number of users per cell (N)

    Forced-LTEForced-WiFi

    SocialGreedy

    RankedOptimal

    Figure 3.10: Comparison of D2D mode selection schemes in terms of the impact of user populationon the system performance with fully backlogged queues (achievable performance):aggregate cell power.

    computational complexity of such an ideal scheme, we only have the results up to 80 users). Interms of energy cost, the aggregate cell power increases with N , as shown in Fig. 3.10, mainlydue to the baseline energy consumption of wireless interfaces. Forced-WiFi has higher energyconsumption because outband users have to maintain two active wireless interfaces instead of one.

    20 Confidential CROWD

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    Figure 3.11: Example of wired resource distribution for dense cellular networks with access andbackhaul elements.

    Finally, we comment on the architectural advantages due to wireless access selection and verticalhandover in very dense cellular networks. Indeed, access selection and vertical handover techniquesare proposed in CROWD to target multiple objectives, among which high throughput, user fairness,energy efficiency and load balancing [8]. Moreover, since the network to optimize not only consists ofmobile devices and base stations, but it also includes switches and routers in the backhaul, we havestudied how to distribute the capacity throughout the network elements when user (re-)associationin the access network can take into consideration such a capacity distribution. An example networkfollowing our suggested architecture is illustrated in the reference diagram of Fig.3.11. For suchkind of networks, we designed (re-)association policies that aim at either maximizing capacity orminimizing network-wide energy consumption.

    In Figs. 3.12 and 3.13, we show the distribution of the user throughput (range of throughput vs.percentage of users) when using a fixed 500 Mbps capacity for the backhaul. The performancesare shown for 80 users and 100 base stations uniformly distributed over a 200m×100m area. In-terestingly, our study shows that little throughput has to be paid for achieving minimal energyconsumption. Moreover, we also found that, with our optimization, it is enough to guarantee SNRvalues as low as -7 dB to save considerable energy while, at the same time, obtaining a throughputdistribution pretty close to the one we would achieve by means of a pure signal-strength-baseduser association. Therefore, we conclude that the per-user perception of the service received is justslightly affected by an association policy that minimizes network energy consumption.

    In conclusion, we have designed and validated a few key architectural features that make possibleto use network access and backhaul resources efficiently under several specific metrics (e.g., energyefficiency, throughput, spectral efficiency, fairness). With these features, which require either cen-tralized or distributed control, CROWD proposes a MAC/resource allocation framework ready totackle the challenges of future super-dense wireless networks.

    CROWD Confidential 21

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    0

    20

    40

    60

    80

    100

    [ 0.00 - 9.33 ]

    [ 9.33 - 18.66 ]

    [ 18.66 - 28.00 ]

    [ 28.00 - 37.33 ]

    [ 37.33 - 46.66 ]

    [ 46.66 - 55.99 ]

    [ 55.99 - 65.32 ]

    [ 65.32 - 74.66 ]

    [ 74.66 - 83.99 ]

    [ 83.99 - 93.32 ]

    % o

    f U

    Es

    Ranges Mb/s

    Max-CapacityMin-Energy

    Figure 3.12: User throughput distribution under different user association policies (with 100 basestations, 80 users, backhaul capacity fixed to 500 Mbps, and SNRmin = -7 dB).

    0

    20

    40

    60

    80

    100

    [ 0.00 - 9.33 ]

    [ 9.33 - 18.66 ]

    [ 18.66 - 28.00 ]

    [ 28.00 - 37.33 ]

    [ 37.33 - 46.66 ]

    [ 46.66 - 55.99 ]

    [ 55.99 - 65.32 ]

    [ 65.32 - 74.66 ]

    [ 74.66 - 83.99 ]

    [ 83.99 - 93.32 ]

    % o

    f U

    Es

    Ranges Mb/s

    Max-CapacityMin-Energy

    Figure 3.13: User throughput distribution under different user association policies (with 100 basestations, 80 users, backhaul capacity fixed to 500 Mbps, and SNRmin = 5 dB).

    3.5 Backhaul and long-term radio configuration

    The backhaul and long-term radio configuration sub-system extends the short-term mechanisms ofWP2 with the medium-long timescale applications and algorithms running on top of the CRC. Askey contributions with impact to the overall architecture, WP3 offers (i) the controller life-cyclemanagement for providing a feasible infrastructure for the long-term radio configuration, (ii) the

    22 Confidential CROWD

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    backhaul management for operating the backhaul network in a traffic proportional manner and(ii) the power cycling of network elements. All aspects have been studied extensively during thelifetime of the project and have hence massively involved since D1.1.

    The mechanisms for short-term decisions and medium-long timescale optimization within theproject have to be run in an execution environment that provides the necessary decision inputand fast access to the network equipment to enforce these decisions. Setting up and maintainingthis execution environment is the goal of the controller life-cycle management. While CROWDinvolves many kinds of different decision and optimization mechanisms, we have found that allof them can be generalized as data flows with special needs in terms of latency, data rate andespecially data processing at a controller. Hence, we have focused our research in this task on flowprocessing-aware controller placement and reassignment and we have developed a fast heuristicflow processing-aware controller placement framework (FCPF) based on the problem statementdescribed in D3.2. In particular, FCPF places the CROWD controller architecture in a networkwith given data flows and meets all requirements on latency, data rate and processing capacity thatare needed for both control applications and data flow processing. Further, FCPF is capable ofperforming flexible reassignment in reaction to changes of network load and/or network topology.More details about the theory and the implementation of this functionality will be reported inD3.3.

    The backhaul management has already been identified as a long-term mechanism in D1.1 andthus benefits from the two-tier architecture in CROWD. The traffic proportional operation of thebackhaul network requires information on a regional scope, hence the backhaul reconfiguration ap-plication has to run on the CRC. This application requires an API to dynamically assign resourcesin the backhaul network for each CROWD district and CLC. This is especially facilitated by thechoice of OpenDaylight (ODL) as the target platform for the CRC. As described in Section 3.2,ODL already provides a full featured API for programming flows in the backhaul network. Italso provides APIs to obtain the backhaul network topology and to monitor changes to it. Theonly missing API was an API for the placement and management of CLCs. This API has beenintegrated into the CRC as described in Section 3.3

    As shown in Fig. 3.14, both the backhaul network reconfiguration and the FCPF applicationsare running on the CRC.

    The power cycling of network elements requires the joint operation of the CRC and the CLCs.Efficient power cycling that does not disrupt the operation of the network is only feasible if it isbased on information from a regional scope (i.e. available on the CRC). But the actual executionof the power cycling is specific to the network elements in each district and thus has to be executedon the CLC of each district. Thus the actual API for power cycling is implemented as part of theCLC as described in Section 3.2. But a power cycling application is able to run on the CRC andaccess the power cycling API of each CLC in the region of the CRC via the CLCManager API(Section 3.3) of the CRC.

    3.6 Connectivity management

    The architecture of the Connectivity Management sub-system has evolved during the lifetime ofthe project due to the different results obtained during the research phase. These results haveyield to changes in the design of the sub-system. This section is devoted to the analysis of theevolution of the WP4 architecture. It takes as basis the architecture first reported in D1.1 andupdated in D4.1 and D4.2. Fig. 3.15 shows the revised view of the Connectivity Managementsub-module where the main interfaces connecting the different modules have been included in thefigure. The definition of the interfaces have not changed from D4.2, hence they are not included inthis description to improve the clarity of the explanation. The WP4 architecture has suffer three

    CROWD Confidential 23

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    Figure 3.14: Backhaul network reconfiguration and FCPF architecture

    Backhaul Elements

    Data Path Anchoring Function

    CRC

    IP Mobility Network Engine

    Tec

    hn

    olo

    gy

    Sp

    ecif

    ic

    Mo

    bil

    ity

    En

    gin

    e

    MN

    Access Selection

    Module

    Connection

    Manager

    IP Mobility

    Terminal Engine

    CLC

    DMM Control Plane

    DMM Control Plane

    DMM GW

    Data Path Anchoring Function

    Intra-district Mobility

    Control Plane

    Information Repositories

    ANDSF ALTO ServerIEEE 802.21 MIIS

    Information Aggregation

    UE_XXX_InfCRC_UE

    CLC_GW_DMM

    CRC_Inf_rep

    CL

    C_C

    RC

    _M

    M

    CL

    C_D

    P

    Figure 3.15: Refined Connectivity Management Sub-module architecture

    24 Confidential CROWD

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    main changes according to the initial architecture explained in D1.1. These changes are explainedin the following:

    • The aggregation of information regarding the access network is performed at the CLC of eachdistrict, but the CLC does not longer interact directly with the Information Repositories,but it indirectly interact with them through the CRC. The reason for this change is that wedetected that there will be quite complex to provide concurrent interaction between severalCLCs and the Information Repositories.

    • The Technology Specific Mobility Engine does not longer deal exclusively with the recon-figuration of the data path elements within a district, but also considers the sharing of theRAN and the configuration of more complex setups, such as the use of VLANs or OpenFlowconfigured tunnels.

    • The functionality of the Connection Manager in the UE has suffered a change in focus. Wewere focusing on providing mechanisms for the detection of the characteristics of the flowsin the terminal, to provide the required level of mobility considering the flow nature. Wehave realized this is not a feasible approach to the problem, hence we are now focusing onapplying the flow analysis to the design of the network to understand the best deployment inreal networks so they benefit from DMM.

    As explained above, the first change corresponds to the modification of the interface betweenthe CLC and the Information Repositories. Originally, the CLC was aggregating the informationcoming from the different measurement probes in the RAN, and then providing this information tobe stored in the repositories. This information could be used by the CRC for global optimizationalgorithms, the UE to optimize mobility decisions and by the CLC for local optimizations. Afterstudying different use cases and scenarios, we have concluded that the real usage of the InformationRepository is coming from the CRC to optimize the overall performance of the network, while theUE will use district local information which will be available at the CLC. Hence we have simplifiedthe overall architecture so the CRC is the one keeping the information at the databases correct andthe CLCs provide updates on each district directly to the CRC. The key functionality providedby the Information Repository to the UE was related to access selection. After studying themechanisms available to influence the terminal attachment, we have concluded that for WiFi weshould use ANQP while for celular districts we should use ANDSF/MIIS. In this way, the CLC willinfluence both databases so they indicate the UE the information desired by the network. This sidone by direct interaction with the CLC.

    The second of the architectural changes corresponds to the Technology Specific Mobility Engine.This module is in charge of modifying the data path followed by a certain flow, so it arrives at thecurrent point of attachment of the terminal, updating it when the user handovers to a different pointof attachment. Originally, this module was thought to be implemented by direct modification of theswitching entries on all data path elements in the path between the terminal and the DMM GW(through the use of OpenFlow). After implementing and analysing this proposal, we have realizedthat it is better in terms of path setup delay, if the district is pre-configured with a set of VLANsor OpenFlow configured paths between points of attachment and DMM GWs. In this way, thesetup of a path is just to add a user to one of these paths, greatly reducing the time required toget the packets from a user flowing. Hence, this new requirement increments the complexity ofthe interface between the data path elements and the CLC, which now must implement this newlogic. In addition to this, we have also work in the design of a solution to force the user handoverbetween different points of attachment in a given district. This is needed to optimize the network,for example enabling a new point of attachment when the count of users passes a certain thresholdand moving some users to it. We have successfully implemented a prototype of this functionalitybased on IEEE 802.11v, which will be reported in D4.3.

    CROWD Confidential 25

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    Finally, the third of the changes to the architecture regards to the Connection Manager atthe terminal. Originally this module was designed in such a way that it will be able to measurecharacteristics of the flows or applications and provide this view to the network, so the best mobilityprotocol could be provided. WP4 partners, UC3M and AVEA, have been working actively towardsachieving this feature but we have concluded it is not feasible. Major operating systems and serviceproviders make use massively of CDNs such as Akamai, hence making impossible the detection ofthe flows just by IP or transport protocol ports. Since a deep analysis of the traffic characteristicsof the users has been performed, we are now focusing on applying the findings to understand if thedeployment of DMM solutions in current cellular network deployments make sense and how thesenetworks can be optimized (e.g., cells associated to an SGSN) to take benefit of DMM approaches.

    3.7 Feedback on real test-bed

    CROWD Project imposes wide variety of requirements on testbed and experimentation on all layersof the protocol Stack. The complexity of integration with SDN Controller, for example CLC alsorequires the testbed platform be based on open components with direct access to different layers,especially PHY/MAC layers to study the impact of SDN-based algorithms for cross layer design.We took into account different CROWD Applications, for example (ABSF, D2D, mobility reconfig-uration, etc) as a basis to design a testbed architecture that could demonstrate the performance ofsubset of CROWD applications within a lab setting in a dense environment. In Fig. 3.16, we illus-

    Remote Host

    MAC

    RLC

    PDCP

    eNB

    IP

    UDP

    GTP

    IP

    UDP

    GTP

    IP

    SGW/PGW

    LV PHY

    LV Real-Time

    FF L1-L2 API

    MAC

    RLC

    PDCP

    IP

    TCP/UDP

    APP

    LV PHY

    LV Real-Time

    UE

    FF L1-L2 API

    Femto Forum (FF)/Small Cell Forum L1-L2 API

    Interface to SDN Controller

    SDN Controller (CLC)

    Algorithms to manage interference

    (for ex. ABSF)

    Figure 3.16: LTE MAC/PHY SDN Architecture for CLC controlling eNBs.

    26 Confidential CROWD

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    trate in more detail how proposed SDN controllers (i.e., CLCs, in this specific case) interact withLTE MAC/PHY interface of an LTE eNB to collect statistics regarding link performance in termsof throughput, channel state information, etc., while at the same time proposing eNB behavioralchanges via a CROWD Local controller (CLC)-MAC Scheduler API. In general, a CLC controllerinteracts with the MAC layer of eNBs to influence parameters related to scheduling; however, thisinterface can be easily extended to higher layer of protocol stack. We have chosen to implementhigh throughput LTE Physical layer in LabVIEW based PXI platform to meet high throughput/lowlatency requirements. However, we chose to use NS-3 LTE LENA stack [9] for implementing higherlayers. NS-3 is widely used system simulator in research community to conduct simulations. Wechose to leverage NS-3 LTE stack to reduce time from simulations to prototyping. We believe suchan approach can produce significant results in much shorter time frame for prototyping ideas fornext generation deployments. During the initial phase of the project, we explored several differentcommercial platforms such as Mymo wireless [10], BEECube [11], Amarisoft [12] and Nutaq [13].However, we found these platforms to be either too expensive for a research project or in somecases there was a lack of open source code, which prohibited the experimentation requirements forCROWD project.

    On prominent application that we plan to demonstrate within CROWD project is CROWDAlmost Blank Sub Frame (CABS), which is described above. CABS refers to different base-stationstaking turns in muting some of their subframe to reduce inter-cell interference. Fig. 3.17 showsthe architecture of CROWD testbed to prototype CABS algorithm in an indoor environment. Itshould be noted that USRP-RIO/PXI system runs PHY layer components of LTE on LabVIEWFPGA, whereas a linux PC runs NS-3 LTE LENA stack on Ubuntu interfacing with LabVIEWFPGA with a UDP interface. CLC is implemented in another Linux machine and interfaces withseveral eNBs on a local Area Network (LAN) connection.

    USRP-RIO USRP-RIO

    USRP-RIO

    USRP-RIO USRP-RIO USRP-RIO USRP-RIO

    CROWD Local Controller (CLC)

    Prototype ICIC/eICIC Algorithms: Almost Blank Sub-Frame (ABSF) Multi-user/Multi-cell Scheduling Rate adaptation

    All experiments conducted within lab

    setting

    USRP-RIO USRP-RIO

    LTE eNB

    LTE UE

    LTE UE

    LTE UE

    LTE UE

    LTE UE

    LTE UE

    LTE eNB

    LTE eNB

    Figure 3.17: LTE eICIC/ICIC Prototyping

    CROWD Confidential 27

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    28 Confidential CROWD

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    4 Dissemination activities

    Dissemination of the results related to this deliverable has been carried out via the followingactivities:

    4.1 Journals and Magazines

    • A solution for transparent mobility with route optimization in the IP multimedia subsystem, I.Vidal, J. Garcia-Reinoso, I. Soto, A. de la Oliva Accepted for publication in Elsevier ComputerCommunications, September 2013.

    • DRONEE: Dual-Radio Opportunistic Networking for Energy Efficiency Computer Commu-nications, A. Asadi and V. Mancuso. Elsevier Computer Communications Journal, February2014.

    • On the implementation, deployment and evaluation of a networking protocol for VANETs:the VARON case, M. I. Sanchez, M. Gramaglia, C.J. Bernardos, A. de la Oliva, M. Calderon.Elsevier Ad Hoc Networks Journal, February 2014.

    • Performance Analysis and Algorithm Selection for Reliable Multicast in IEEE 802.11aa Wire-less LAN, A. Banchs, A. de la Oliva, L. Eznarriaga, D. R. Kowalski, P. Serrano. IEEETransactions on Vehicular Technology, January 2014.

    • Multicast group membership management in media independent handover services, CarlosGuimaraes, Daniel Corujo, Antonio de la Oliva, Yoshihiro Ohba, Rui L. Aguiar. ElsevierComputer Networks, January 2014.

    • A First Implementation and Evaluation of the IEEE 802.11aa Group Addressed TransmissionService, P. Salvador, L. Cominardi, F. Gringoli, P. Serrano. ACM Computer CommunicationReview, January 2014.

    • On IEEE 802.11k/r/v Amendments: Do They Have a Real Impact?, M.I. Sanchez, A. Bouk-erche. Accepted for publication in IEEE Wireless Communications Magazine.

    • A Survey on Device-to-Device Communication in Cellular Networks, A. Asadi, Q. Wang, V.Mancuso. IEEE Surveys and Tutorials on Communications, 2014.

    • On the Efficient Utilization of Radio Resources in Extremely Dense Wireless Networks, A.Asadi, V. Sciancalepore, V. Mancuso. IEEE Communication Magazine, 2014.

    4.2 Conferences

    • An SDN-based Network Architecture for Extremely Dense Wireless Networks, H. Ali- Ahmad,C. Cicconetti, A. de la Oliva, V. Mancuso, M. R. Sama, P. Seite, S. Shanmugalingam. InProceedings of IEEE Software Defined Networks for Future Networks and Services (IEEESDN4FNS), November 2013.

    CROWD Confidential 29

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    • WiFi Direct and LTE D2D in Action, A. Asadi, V. Mancuso. In Proceedings of WirelessDays’13, Valencia, Spain, November 2013.

    • On the Compound Impact of Opportunistic Scheduling and D2D Communications in CellularNetworks. A. Asadi, V. Mancuso. ACM/IEEE MSWiM’13, Barcelona, Spain, Nov, 2013.

    • CROWD: An SDN Approach for DenseNets, H. Ali-Ahmad, C. Cicconetti, A. de la Oliva,M. Draexler, R. Gupta, V. Mancuso, L. Roullet, V. Sciancalepore. European Workshop onSoftware Defined Networking (EWSDN13), Berlin, Germany, October 10-11, 2013.

    • Distributed OFDMA resource and power allocation using Gibbs sampling methods, V. Garcia,C. S. Chen, Y. Zhou, J. Shi. 11th International Conference on Optical Internet (COIN),Beijing, Oct 2013.

    • Energy consumption savings with 3G offload, M. I. Sanchez, C. J. Bernardos, A. de la Oliva,P. Serrano. First International Workshop on Cloud Technologies and Energy Efficiency inMobile Communication Networks (CLEEN’13), Las Vegas, USA, Sep. 2013

    • Markov Model for Opportunistic Routing in Wireless Networks, A. Darehshoorzadeh, MI.Sanchez, A. Boukerche. In IEEE International Symposium on a World of Wireless Mobileand Multimedia Networks 2014 (WoWMoM 2014).

    • A Generic Framework for Dynamic eICIC Optimization in LTE Heterogeneous Networks, N.Trabelsi, R. Laurent, A. Feki. At IEEE Vehicular Technology Conference 2014.

    • Feasibility of Base Station Coordination and Dynamic Backhaul Network Configuration inBackhaul Networks with Limited Capacity, M. Dräxler, H. Karl. In European Wireless 2014(EW2014).

    • Flow processing-aware Controller Placement in Wireless DenseNets, S. Auroux, H. Karl. InProceedings of the 25th IEEE International Symposium on Personal, Indoor and MobileRadio Communications (PIMRC2014).

    • SmarterPhones: Anticipatory Download Scheduling for Segmented Wireless Video Streaming,M. Dräxler, H. Karl. In 1st KuVS Workshop on Anticipatory Networks, 2014.

    • Anticipatory Power Cycling of Mobile Network Equipment for High Demand Multimedia Traf-fic, M. Dräxler, P. Dreimann, H. Karl. In IEEE Online Conference on Green Communications(IEEE Online GreenComm’14).

    • MaxiNet: Distributed Emulation of Software-Defined Networks, P. Wette, M. Dräxler, A.Schwabe, F. Wallaschek, M. Hassan Zahraee, H. Karl. In Proceedings of the 2014 IFIPNetworking Conference (Networking 2014). IEEE, pp. 1-9.

    • Modeling Multi-Mode D2D Communications in LTE. A. Asadi, P. Jacko, V. Mancuso. Inproceedings of ACM SIGMETRICS MAMA 2014, Austin, TX, USA, June 2014.

    • Interference Coordination Strategies for Content Update Dissemination in LTE-A,V. Scian-calepore, V. Mancuso, A. Banchs, S. Zaks, A. Capone. In proceedings of INFOCOM 2014,Toronto, Canada, April-May 2014.

    • LabVIEW based Platform for prototyping dense LTE Networks in CROWD Project, R. Gupta,T. Vogel, N. Kundargi, A. Ekbal, A. Morelli, V. Mancuso, V. Sciancalepore, R. Ford, S.Rangan. In proceedings of EuCNC 2014, Bologna, Italy, June 2014.

    30 Confidential CROWD

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    • Energy-Efficient User Association In Extremely Dense Small Cell Networks, C. Bottai, C.Cicconetti, A. Morelli, M. Rosellini, C. Vitale. In proceedings of EuCNC 2014, Bologna,Italy, June 2014.

    • A Mechanism for Fair Distribution of Resources with Application to Sponsored Search, E.Christoforou, A. Fernndez Anta, A. Santos. In proceedings of Web and Internet Economics(WINE) 2014, Beijing, China, December 14-17, 2014

    4.3 Tutorials & Panels

    • Keynote speech of C. Cicconetti on The road towards heterogeneous & dense wireless networks:the CROWD perspective at CROSSFIRE plenary meeting, on July 2, 2013 in Paris, France.

    • NI RF Round Table on 3-4 Dec, 2013 in Lyon, France Rohit Gupta showed the WP5 activitiesbased on NI/PXI platform for prototyping LTE-like dense wireless networks. This event wasNI internal event to network different researchers throughout Europe involved in prototypingactivities using NI/PXI platform. IMDEA, INCS, UC3M are invited and participated to theevent.

    • SDN Experimentation Facilities and Tools, K. Pentikousis, U. Toseef, P. Wette, M. Dräxler.MaxiNet Tutorial at MONAMI 2014 (http://mon-ami.org/2014/show/tutorials).

    • Invited talk of V. Mancuso (IMDEA), describing CROWD and the project activities: V. Man-cuso, ”Advanced Technologies for Extremely Dense and Heterogeneous Wireless Networks” atIWPC workshop on Advanced Small Cell Deployments and Cloud Technologies on 12-14 Novin Turin, Italy. In addition, V. Mancuso took part to the Research Session Panel” of theworkshop on November 14.

    • Participation of Antonio de la Oliva as speaker in the Wireless SDN tutorial to the IEEE802 plenary meeting, Dallas, Tx, November 2013. The tutorial addressed applications ofSDN in wireless access and backhaul networks, with a focus on issues relevant to IEEE 802technologies. Tutorial background on the basics of SDN and OpenFlow was provided as anintroduction to the subject. The slides used during the presentation can be found at url:https://mentor.ieee.org/802-ec/dcn/13/ec-13-0055-01-00EC.pdf

    • NIWeek’14 on 4-7 Aug, 2014 in Austin, USA Rohit Gupta showed the WP5 activities basedon NI/PXI platform for prototyping LTE-like dense wireless networks. This event was NIinternal event to network different researchers throughout the world involved in prototypingactivities using NI/PXI platform.

    • 3GPP Closed Door Meeting on 20 Aug, 2014 in Dresden, Germany Rohit Gupta showed theWP5 activities based on NI/PXI platform for prototyping LTE-like dense wireless networks.This event was NI internal event to showcase NI/PXI platform within CROWD project to3GPP attendees in Dresden.

    • Globecom’14 on 8-12 Dec, 2014 in Austin, USA Rohit Gupta organized a SDR panel inIndustry Forum and Exhibition Program titled, ”‘SDR Prototyping challenges for dense de-ployments for next generation wireless networks (LTE, WiFi)”’

    CROWD Confidential 31

    https://mentor.ieee.org/802-ec/dcn/13/ec-13-0055-01-00EC.pdf

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    4.4 Posters & Demo

    • The Playground of Wireless Dense Networks of the Future, H. Ali-Ahmad, C. Cicconetti, M.Draexler, R. Gupta, V. Mancuso, A. Morelli, L. Roullet, M. I. Sanchez, V. Sciancalepore.Future Network & Mobile Summit 2013, Lisbon, Portugal, July 3-5, 2013.

    • DEMO: LabVIEW based framework for prototyping dense LTE networks, R. Gupta, B. Bach-man, R. Ford, S. Rangan, A. Morelli, V. Mancuso, N. Kundargi, and A. Ekbal. In proceedingsof WiNTECH 2014 (Demo/Poster Session).

    • A prototyping methodology for SDN-controlled LTE using LabVIEW SDR and NS3,C. Vi-tale, R. Gupta, V. Mancuso, A. Morelli. Demo at ETSI workshop on Reconfigurable RadioSystems, Sophia Antipolis, France, December 3-4, 2014.

    • LabVIEW based Platform for prototyping dense LTE Networks, R. Gupta, A. Ekbal, A.Nahler, V. Mancuso, A. De La Oliva, A. Morelli, R. Ford, S. Rangan. In proceedings ofGLOBECOM 2014 (Demo in the Industry Program).

    • The CROWD framework for tackling challenges of dense small cell deployments using Soft-ware Defined Networking (SDN), R. Gupta, M. Draexler, H. Karl, V. Mancuso, A. De LaOliva, A. Morelli, E. Bizouarn, E. Zeydan. In proceedings of GLOBECOM 2014 (Poster inthe Industry Program).

    • A prototyping methodology for SDN-controlled LTE using SDR, V. Mancuso, C. Vitale, R.Gupta, K. Rathi, and A. Morelli. Demo at ETSI workshop on Reconfigurable Radio Systems,Sophia Antipolis, France, December 3-4, 2014.

    4.5 Standardization

    4.5.1 IEEE 802.1cf (OMNIRAN)

    • PAR and 5C Text Comments, Antonio de la Oliva (UC3M), September 2013. https://mentor.ieee.org/omniran/dcn/13/omniran-13-0076-00-0000-par-and-5c-text-comments.do

    cx

    • Proposed OmniRAN SDN Use Case for External Communication, Roger Marks, Antonio de laOliva, Juan Carlos Zuniga (EthAirNet, UC3M, InterDigital), August 2013. https://mentor.ieee.org/omniran/dcn/13/omniran-13-0059-00-0000-proposed-omniran-sdn-use-cas

    e-for-external-communication.pptx

    • SDN Use Cases Summary, Antonio de la Oliva (UC3M), Juan Carlos Zuniga (InterDigital),Roger Marks (EthAirNet), July 2013. https://mentor.ieee.org/omniran/dcn/13/omniran-13-0044-02-0000-sdn-use-cases-summary.pptx

    • SDN Use Case ToC, Juan Carlos Zuniga (InterDigital), Antonio de la Oliva (UC3M), Pre-sented in the January 2014 meeting. https://mentor.ieee.org/omniran/dcn/14/omniran-14-0007-00-0000-sdn-use-case-toc.pptx

    • SDN Use Cases for BoF, Juan Carlos Zuniga (InterDigital), Antonio de la Oliva (UC3M),Paul Congdon (Tallac), Presented in the March 2014 meeting. https://mentor.ieee.org/omniran/dcn/14/omniran-14-0029-00-0000-sdn-based-use-cases-for-bof.pptx

    32 Confidential CROWD

    https://mentor.ieee.org/omniran/dcn/13/omniran-13-0076-00-0000-par-and-5c-text-comments.docxhttps://mentor.ieee.org/omniran/dcn/13/omniran-13-0076-00-0000-par-and-5c-text-comments.docxhttps://mentor.ieee.org/omniran/dcn/13/omniran-13-0076-00-0000-par-and-5c-text-comments.docxhttps://mentor.ieee.org/omniran/dcn/13/omniran-13-0059-00-0000-proposed-omniran-sdn-use- case-for-external-communication.pptxhttps://mentor.ieee.org/omniran/dcn/13/omniran-13-0059-00-0000-proposed-omniran-sdn-use- case-for-external-communication.pptxhttps://mentor.ieee.org/omniran/dcn/13/omniran-13-0059-00-0000-proposed-omniran-sdn-use- case-for-external-communication.pptxhttps://mentor.ieee.org/omniran/dcn/13/omniran-13-0044-02-0000-sdn-use-cases- summary.pptxhttps://mentor.ieee.org/omniran/dcn/13/omniran-13-0044-02-0000-sdn-use-cases- summary.pptxhttps://mentor.ieee.org/omniran/dcn/14/omniran-14 -0007-00-0000-sdn-use-case-toc.pptxhttps://mentor.ieee.org/omniran/dcn/14/omniran-14 -0007-00-0000-sdn-use-case-toc.pptxhttps://mentor.ieee.org/omniran/dcn/14/omniran-14-0029-00-0000-sdn-based-use-cases-for-bof.pptxhttps://mentor.ieee.org/omniran/dcn/14/omniran-14-0029-00-0000-sdn-based-use-cases-for-bof.pptx

  • Document: FP7-ICT-2011-8-318115-CROWD/D 1.3Date: March 3, 2015 Security: ConfidentialStatus: Submitted to EC Version: 1.1

    • SDN Use Cases and Requirements, Juan Carlos Zuniga (InterDigital), Antonio de la Oliva(UC3M), Paul Congdon (Tallac), May 2014. https://mentor.ieee.org/omniran/dcn/14/omniran-14-0041-00-CF00-sdn-use-cases-and-requirements.docx

    • Generic IEEE 802 Network Reference Model, Antonio de la Oliva (UC3M), Juan CarlosZuniga (InterDigital), Luis Contreras (Telefonica), Roger Marks (EthAirNet Associates),Nov 2014. https://mentor.ieee.org/omniran/dcn/14/omniran-14-0068-03-CF00-generic-ieee-802-network-reference-model.docx

    4.5.2 IEEE 802.21d

    • Restructure Clause 9.4, Lily Chen (NIST), Antonio de la Oliva (UC3M) , November 2013. https://mentor.ieee.org/802.21/dcn/13/21-13-0227-02-MuGM-restructure-cluase-9-4.

    docx

    • Section 9.4.2 flow chart, Antonio de la Oliva (UC3M), September 2013. https://mentor.ieee.org/802.21/dcn/13/21-13-0178-01-MuGM-section-9-4-2-flow-char.pdf

    • Remedy for the Proxy for Information Services, Antonio de la Oliva, Subir Das, July 2013. https://mentor.ieee.org/802.21/dcn/13/21-13-0114-00-srho-remedy-for-the-proxy-f

    or-information-services.docx

    • Antonio de la Oliva has served as Technical Editor of IEEE 802.21d during 2014. Currentversion of the draft document is D7.0. This document is currently undergoing the secondsponsor ballot.

    • Remedy for comment #79, 81, 82, 100, Antonio de la Oliva (UC3M), Yoshikazu Hanatani(Toshiba), April 2014. https://mentor.ieee.org/802.21/dcn/14/21-14-0057-01-MuGM-remedy-for-comment-79-81-82-100.docx

    • Remedy comment #83, fig38, Antonio de la Oliva (UC3M), April 2014. https://mentor.ieee.org/802.21/dcn/14/21-14-0071-00-MuGM-remedy-comment-83-fig38.pdf

    • Remedy comment #83, fig39, Antonio de la Oliva (UC3M), April 2014. https://mentor.ieee.org/802.21/dcn/14/21-14-0072-00-MuGM-remedy-comment-83-fig39.pdf

    • Remedy comment #83, fig41, Antonio de la Oliva (UC3M), April 2014. https://mentor.ieee.org/802.21/dcn/14/21-14-0073-00-MuGM-remedy-comment-83-fig41.pdf

    4.5.3 IEEE 802 EC Privacy Recommendation SG

    • MAC experiments and Wiki procedures, Fabio Giust (UC3M), C.J. Bernardos (UC3M) andAntonio de la Oliva (UC3M), Oct 2014. https://mentor.ieee.org/privecsg/dcn/14/privecsg-14-0015-00-0000-mac-experiments-and-wiki-procedures.ppt

    • UC3M has participated organising the WiFi Privacy Network Experiment at IETF91.

    • W