Studentische Arbeiten

Wir bieten Studierenden die Gelegenheit zur aktiven Mitarbeit an spannenden und hochaktuellen Forschungsthemen und Forschungsprojekten im Rahmen ihrer Prüfungsleistungen.

Bei uns können Sie Ihre Bachelor- (BA) und Masterarbeit (MA) sowohl direkt am Lehrstuhl als auch in der Industrie durchführen. Studierende der Elektrotechnik und Informationstechnik können bei uns ihre Ingenieurpraxis (IP) und ihre Forschungspraxis (FP) direkt am Lehrstuhl durchführen. Für Studierende aus anderen Studiengängen, wie z.B. der Informatik, bieten wir "Interdisziplinäre Projekte (IDPs)" an. Bitte kontaktieren Sie uns hierzu direkt.

Auf dieser Seite finden Sie auch offene Stellen für wissenschaftliche Hilfskräfte (Werkstudenten), gekennzeichnet mit SHK.

Zu einem Thema sind verschiedene Arten von Arbeiten möglich. Das Thema wird dann entsprechend der Zielsetzung im Schwierigkeitsgrad und Aufwand z.B. BA oder MA angepasst.

Bitte beachten: Auf dieser Seite listen wir auch die bereits vergebenen Arbeiten "Laufende Arbeiten", damit Sie einen Eindruck bekommen, welche Themengebiete bearbeitet werden. Wenn Ihnen ein Thema bei den Laufenden Arbeiten gefällt, dann kontakrieren Sie die Betreuerin/den Betreuer und fragen, ob es eine Folgearbeit zu einem ähnlichen Thema gibt. Oft ist dies der Fall.

Offene Arbeiten

Working Student for the Implementation of a Medical Testbed

Stichworte:
Communication networks, programming
Kurzbeschreibung:
Your goal is to implement a network for critical medical applications based on an existing open-access 5G networking framework as well as the adaptation of this network according to the needs of our research.

Beschreibung

Beginning possible from 1st August 2024

Future medical applications put stringent requirements on the underlying communication networks in terms of highest availability, maximal throughput, minimal latency, etc. Thus, in the context of the 6G-life project, new networking concepts and solutions are being developed.

For the research of using 6G for medical applications, the communication and the medical side have joined forces: While researchers from the MITI group (Minimally invasive Interdisciplinary Therapeutical Intervention), located at the hospital "Rechts der Isar", focus on the requirements of the medical applications and collecting needed parameters of patients, it is the task of the researchers at LKN to optimize the network in order to satisfy the applications' demands. The goal of this joint research work is to have working testbeds for two medical testbeds located in the hospital to demonstrate the impact and benefits of future 6G networks and concepts for medical applications.

Your task during this work is to implement the communcation network for those testbeds. Based on an existing open-access 5G network implementation, you will implement changes according to the progress of the current research. The results of your work, working 6G medical testbeds, will enable researchers to validate their approaches with real-world measurements and allow to demonstrate future 6G concepts to research, industry and politics.

In this project, you will gain a deep insight into how communication networks, especially the Radio Access Network (RAN), work and how different aspects are implemented. Additionally, you will understand the current limitations and weaknesses as well as concepts for improvement. Also, you will get some insights into medical topics if interested. As in such a broad topic there are many open research questions, you additionally have the possibility to also write your thesis or complete an internship.

Voraussetzungen

 

  • Most important: Motivation and willingness to learn unknown things.
  • C/C++ and knowledge about how other programming languages work (Python, etc.) and/or the willingness to work oneself into such languages.
  • Preferred: Knowledge about communication networks (exspecially the RAN), 5G concepts, the P4 language, SDN, Linux.
  • Initiative to bring in own ideas and solutions.
  • Ability to work with various partners (teamwork ability).

Please note: It is not necessary to know about every topic aforementioned, much more it is important to be willing to read oneself in.

Kontakt

Betreuer:

Nicolai Kröger

Mobile Communication RRC Message Security Analysis

Stichworte:
5G, SDR, Security, RAN

Beschreibung

In this topic an analysis of RRC messages in 4G and 5G should be done. There exist several different kind of these messages with different functions and level of information content. The focus should lay on messages related to the connection release. The analysis should consider privacy and security aspects. After the theoretical review and analysis the practical part should focus on an attack. An implementation of one security and privacy aspect should be done as a proof-of-concept with Open Source hard- and software.

The following things are requested to be designed, implemented, and evaluated (most likely via proof-of-concept) in this thesis:
• Security and availability analysis of specific RRC messages
• Implementation of an attack
• Practical evaluation with testing of commercial smartphones

We will offer you:
• Initial literature
  - https://doi.org/10.14722/NDSS.2016.23236
• Smart working environment
• Deep contact to supervisors and a lot of discussions and knowledge exchange

A detailed description of the topics will be formulated with you in initial meetings. For sure, the report needs to be written based on the requirements of the universities, as well as a detailed documentation and handing over the complete project with all sources. Depending on the chosen thesis type the content will be adapted in its complexity.

All applications must be submitted through our application website INTERAMT:
https://interamt.de/koop/app/stelle?id=1103974

Carefully note the information provided on the site to avoid any issues with your application.

Please include
• a short CV
• current overview of your grades
• the keyword "T3-MK-RRC" as comment
in your application.

For any questions or further details regarding this thesis and the application process, please don't hesitate
to contact:
• TUM contact: nicolai.kroeger@tum.de, serkut.ayvasik@tum.de
• Forschungreferat T3 (ZITiS), Email: t3@zitis.bund.de

Voraussetzungen

Knowledge in the following fields is required:
• C/C++
Knowledge in the following fields would be an advantage:
• Mobile Communication 4G, 5G

Kontakt

• TUM contact: nicolai.kroeger@tum.de, serkut.ayvasik@tum.de
• Forschungreferat T3 (ZITiS), Email: t3@zitis.bund.de

Betreuer:

Serkut Ayvasik, Nicolai Kröger - (Zentrale Stelle für Informationstechnik im Sicherheitsbereich (ZITiS))

Mobile Communication Broadcast Message Security Analysis

Stichworte:
5G, SDR, Security, RAN

Beschreibung

In this topic an analysis of Broadcast messages in 4G and 5G should be done. There exist several different kind of these messages with different functions and level of information content. The analysis should consider privacy and security aspects. After the theoretical review and analysis the practical part should focus on one aspect of the findings. An implementation of one security and privacy aspect should be done as a proof-of-concept with Open Source hard- and software.

The following things are requested to be designed, implemented, and evaluated (most likely via proof-of-concept) in this thesis:
• Security and privacy analysis of Broadcast Messages
• Implementation of an attack
• Practical evaluation with testing of commercial smartphones

We will offer you:
• Initial literature
- https://dl.acm.org/doi/10.1145/3307334.3326082
• Smart working environment
• Deep contact to supervisors and a lot of discussions and knowledge exchange

A detailed description of the topics will be formulated with you in initial meetings. For sure, the report needs to be written based on the requirements of the universities, as well as a detailed documentation and handing over the complete project with all sources. Depending on the chosen thesis type the content will be adapted in its complexity.


All applications must be submitted through our application website INTERAMT:
https://interamt.de/koop/app/stelle?id=1103974

Carefully note the information provided on the site to avoid any issues with your application.


Please include
• a short CV
• current overview of your grades
• the keyword "T3-MK-BROADCAST" as comment
in your application.


For any questions or further details regarding this thesis and the application process, please don't hesitate to contact:
• TUM contact: nicolai.kroeger@tum.de, serkut.ayvasik@tum.de
• Forschungreferat T3 (ZITiS), Email: t3@zitis.bund.de

Voraussetzungen

Knowledge in the following fields is required:
• C/C++
Knowledge in the following fields would be an advantage:
• Mobile Communication 4G, 5G

Kontakt

• TUM contact: nicolai.kroeger@tum.de, serkut.ayvasik@tum.de
• Forschungreferat T3 (ZITiS), Email: t3@zitis.bund.de

Betreuer:

Serkut Ayvasik, Nicolai Kröger - (Zentrale Stelle für Informationstechnik im Sicherheitsbereich (ZITiS))

Improving network availability- a min cut set approach

Stichworte:
availability, reliability, Minimal cut set

Beschreibung

A cut set is a set of components that, by failing, causes the system to fail. A cut set is minimal if it cannot be reduced without losing its status as a cut set.

In this work, we aim to improve network availability based on the mincutsets. We employ graph coloring methods to improve the availability of mincutsets.

 

Voraussetzungen

Mandatory: Python
Communication Network Reliability course, and Integer Linear Programming.

Kontakt

shakthivelu.janardhanan@tum.de

Betreuer:

Shakthivelu Janardhanan

Working Student for the Implementation of a Medical Testbed

Stichworte:
Communication networks, programming
Kurzbeschreibung:
Your goal is to implement a network for critical medical applications based on an existing open-access 5G networking framework as well as the adaptation of this network according to the needs of our research.

Beschreibung

Beginning possible from 1st October 2024

Future medical applications put stringent requirements on the underlying communication networks in terms of highest availability, maximal throughput, minimal latency, etc. Thus, in the context of the 6G-life project, new networking concepts and solutions are being developed.

For the research of using 6G for medical applications, the communication and the medical side have joined forces: While researchers from the MITI group (Minimally invasive Interdisciplinary Therapeutical Intervention), located at the hospital "Rechts der Isar", focus on the requirements of the medical applications and collecting needed parameters of patients, it is the task of the researchers at LKN to optimize the network in order to satisfy the applications' demands. The goal of this joint research work is to have working testbeds for two medical testbeds located in the hospital to demonstrate the impact and benefits of future 6G networks and concepts for medical applications.

Your task during this work is to implement the communcation network for those testbeds. Based on an existing open-access 5G network implementation, you will implement changes according to the progress of the current research. The results of your work, working 6G medical testbeds, will enable researchers to validate their approaches with real-world measurements and allow to demonstrate future 6G concepts to research, industry and politics.

In this project, you will gain a deep insight into how communication networks, especially the Radio Access Network (RAN), work and how different aspects are implemented. Additionally, you will understand the current limitations and weaknesses as well as concepts for improvement. Also, you will get some insights into medical topics if interested. As in such a broad topic there are many open research questions, you additionally have the possibility to also write your thesis or complete an internship.

Voraussetzungen

 

  • Most important: Motivation and willingness to learn unknown things.
  • C/C++ and knowledge about how other programming languages work (Python, etc.) and/or the willingness to work oneself into such languages.
  • Preferred: Knowledge about communication networks (exspecially the RAN), 5G concepts, the P4 language, SDN, Linux.
  • Initiative to bring in own ideas and solutions.
  • Ability to work with various partners (teamwork ability).

Please note: It is not necessary to know about every topic aforementioned, much more it is important to be willing to read oneself in.

Kontakt

Betreuer:

Nicolai Kröger

Latency and Reliability Guarantees in Multi-domain Networks

Stichworte:
Multi-domain networks

Beschreibung

One of the aspects not covered by 5G networks are multi-domain networks, comprising one or more campus networks. There are private networks, including the Radio Access Network and Core Network, not owned by the cellular operators like within a university, hospital, etc. There will be scenarios in which the transmitter is within a different campus network from the receiver, and the data would have to traverse networks operated by different entities.

Given the different operators managing the “transmitter” and “receiver” networks, providing any end-to-end performance guarantees in terms of latency and reliability can pose significant challenges in multi-domain networks. For example, if there is a maximum latency that a packet can tolerate in the communication cycle between the transmitter and receiver, the former experiencing given channel conditions would require a given amount of RAN resources to meet that latency. The receiver, on the other end of the communication path, will most probably experience different channel conditions. Therefore, it will require a different amount of resources to satisfy the end-to-end latency requirement. Finding an optimal resource allocation approach across different networks that would lead to latency and reliability guarantees in a multi-domain network will be the topic of this thesis.     

Voraussetzungen

The approach used to solve these problems will rely on queueing theory. A good knowledge of any programming language is required.

Betreuer:

Fidan Mehmeti

Decentralized Federated Learning on Constrained IoT Devices

Beschreibung

The Internet of Things (IoT) is an increasingly prominent aspect of our daily lives, with connected devices offering unprecedented convenience and efficiency. As we move towards a more interconnected world, ensuring the privacy and security of data generated by these devices is paramount. That is where decentralized federated learning comes in.

Federated Learning (FL) is a machine-learning paradigm that enables multiple parties to collaboratively train a model without sharing their data directly. This thesis focuses on taking FL one step further by removing the need for a central server, allowing IoT devices to directly collaborate in a peer-to-peer manner.

In this project, you will explore and develop decentralized federated learning frameworks specifically tailored for constrained IoT devices with limited computational power, memory, and energy resources. The aim is to design and implement efficient algorithms that can harness the collective power of these devices while ensuring data privacy and device autonomy. This involves tackling challenges related to resource-constrained environments, heterogeneous device capabilities, and maintaining security and privacy guarantees.

The project offers a unique opportunity to contribute to cutting-edge research with real-world impact. Successful outcomes will enable secure and private machine learning on IoT devices, fostering new applications in areas such as smart homes, industrial automation, and wearable health monitoring.

Responsibilities:

  • Literature review on decentralized federated learning, especially in relation to IoT and decentralized systems.
  • Design and development of decentralized FL frameworks suitable for constrained IoT devices.
  • Implementation and evaluation of the proposed framework using real-world datasets and testbeds.
  • Analysis of security and privacy aspects, along with resource utilization.
  • Documentation and presentation of findings in a thesis report, possibly leading to publications in top venues.

Requirements:

  • Enrollment in a Master's program in Computer Engineering, Computer Science, Electrical Engineering or related fields
  • Solid understanding of machine learning algorithms and frameworks (e.g., TensorFlow, PyTorch)
  • Proficiency in C and Python programming language
  • Experience with IoT devices and embedded systems development
  • Excellent analytical skills and a systematic problem-solving approach


Nice to Have:

  • Knowledge of cybersecurity and privacy principles
  • Familiarity with blockchain or other decentralized technologies
  • Interest in distributed computing and edge computing paradigms

Kontakt

Email: navid.asadi@tum.de

Betreuer:

Navidreza Asadi

Attacks on Cloud Autoscaling Mechanisms

Stichworte:
Cloud Computing, Kubernetes, autoscaling, low and slow attacks, Horizontal Pod Autoscaler (HPA), Vertical Pod Autoscaler (VPA), cloud security, container orches

Beschreibung

In the era of cloud-native computing, Kubernetes has emerged as a leading container orchestration platform, enabling seamless scalability and reliability for modern applications.

However, with its widespread adoption comes a new frontier in cybersecurity challenges, particularly low and slow attacks that exploit autoscaling features to disrupt services subtly yet effectively.

This project aims to delve into the intricacies of these attacks, examining their impact on Kubernetes' Horizontal Pod Autoscaler (HPA) and Vertical Pod Autoscaler (VPA), and proposing mitigation strategies for more resilient systems.

Responsibilities:

  • Conduct a thorough literature review to identify existing knowledge gaps and research on similar attacks.
  • Develop methodologies to simulate low and slow attack scenarios on Kubernetes clusters with varying configurations of autoscaling mechanisms.
  • Analyze the impact of these attacks on resource utilization, service availability, and overall system performance.
  • Evaluate current defense mechanisms and propose novel strategies to enhance the resilience of Kubernetes' autoscaling features.
  • Implement and test selected mitigation approaches in a controlled environment.
  • Document findings, present a comparative analysis of effectiveness, and discuss implications for future development in cloud security practices.


Requirements:

  • A strong background in computer engineering, computer science or a related field.
  • Familiarity with Kubernetes architecture and container orchestration concepts.
  • Experience in deploying and managing applications on Kubernetes clusters.
  • Proficiency in at least one scripting/programming language (e.g., Python, Go).
  • Understanding of cloud computing and cybersecurity fundamentals.


Nice to Have:

  • Prior research or hands-on experience in cloud security, particularly in the context of Kubernetes.
  • Knowledge of network protocols and low-level system interactions.
  • Experience with DevOps tools and practices.

 

Kontakt

Email: navid.asasdi@tum.de

Betreuer:

Navidreza Asadi

Working Student/Research Internship - On-Device Training on Microcontrollers

Beschreibung

We are seeking a highly motivated and skilled student to replicate a research paper that explores the application of pruning techniques for on-device training on microcontrollers. The original paper demonstrated the feasibility of deploying deep neural networks on resource-constrained devices, and achieved significant reductions in model size and computational requirements while maintaining acceptable accuracy.

Responsibilities:

  • Extend our existing framework by implementing the pruning techniques on a microcontroller-based platform (e.g., Arduino, ESP32)
  • Replicate the experiments described in the original paper to validate the results
  • Evaluate the performance of the pruned models on various benchmark datasets
  • Compare the results with the original paper and identify areas for improvement
  • Document the replication process, results, and findings in a clear and concise manner

Requirements:

  • Strong programming skills in C and Python
  • Experience with deep learning frameworks (e.g., TensorFlow, PyTorch) and microcontroller-based platforms
  • Familiarity with pruning techniques for neural networks is a plus
  • Excellent analytical and problem-solving skills
  • Ability to work independently and manage time effectively
  • Strong communication and documentation skills

 

Kontakt

Email: navid.asadi@tum.de

Betreuer:

Navidreza Asadi

Working Student - Machine Learning Serving on Kubernetes

Stichworte:
Machine Learning, Kubernetes, Containerization, Docker, Orchestration, Cloud Computing, MLOps, Machine Learning Operations, DevOps, Microservices Architecture,

Beschreibung

We are seeking an ambitious and forward-thinking working student to join our dynamic team working at the intersection of Machine Learning (ML) and Kubernetes. In this exciting role, you will be immersed in a cutting-edge environment where advanced ML models meet the power of container orchestration through Kubernetes. Your contributions will directly impact the development and optimization of scalable and robust ML serving systems leveraging the benefits of Kubernetes.

If you are a student passionate about both Machine Learning and Kubernetes, we invite you to join us on this exciting journey! We offer the chance to pioneer cutting-edge solutions that leverage the power of these two transformative technologies.

Responsibilities:

  • Collaborate with a cross-functional team to design and implement ML workflows on Kubernetes.
  • Assist in packaging and deploying ML models as microservices using containers (Docker) and managing them effectively through Kubernetes.
  • Optimize resource allocation, scheduling, and scaling strategies for efficient model serving at varying workloads.
  • Implement monitoring solutions specific to ML inference tasks within the Kubernetes cluster.
  • Troubleshoot and debug issues related to containerized ML applications
  • Document best practices, tutorials, and guides on leveraging Kubernetes for ML serving

Requirements:

  • Currently enrolled in a Bachelor's or Master's program in School of CIT
  • Strong programming skills in Python with experience in software development lifecycle methodologies.
  • Familiarity with machine learning frameworks such as TensorFlow and PyTorch.
  • Proficiency in container technologies. Docker and Kubernetes certification would be a plus but not mandatory.
  • Experience with cloud computing platforms; e.g., AWS, GCP or Azure.
  • Demonstrated ability to work independently with effective time management and strong problem-solving analytical skills.
  • Excellent communication and teamwork capabilities.

Nice to Have:

  • Kubernetes Certification: Having a valid Kubernetes certification (CKA, CKAD, or CKE) demonstrates your expertise in container orchestration and can be a significant advantage.
  • Experience with DevOps and/or MLOps Tools: Familiarity with MLOps tools such as MLflow, Kubeflow, or TensorFlow Extended (TFX) can help you streamline the machine learning workflow and improve collaboration. Experience with OpenTelemetry, Jaeger, Istio, and monitoring tools is a plus.
  • Knowledge of Distributed Systems: Understanding distributed systems architecture and design patterns can help you optimize the performance and scalability of your machine learning models.
  • Contributions to Open-Source Projects: Having contributed to open-source projects related to Kubernetes, machine learning, or MLOps demonstrates your ability to collaborate with others and adapt to new technologies.
  • Familiarity with Agile Methodologies: Knowledge of agile development methodologies such as Scrum or Kanban can help you work efficiently in a fast-paced environment and deliver results quickly.
  • Cloud-Native Application Development: Experience with cloud-native application development using frameworks like Cloud Foundry or AWS Cloud Development Kit (CDK) can be beneficial in designing scalable and efficient machine learning workflows.

 

Kontakt

Email: navid.asadi@tum.de

 

Betreuer:

Navidreza Asadi

Working Student for the Edge AI Testbed

Stichworte:
IoT, Edge Computing, Machine Learning, Measurement, Power Characterization

Beschreibung

We are seeking a highly motivated and enthusiastic Working Student to join our team as part of the Edge AI Testbed project. As a Working Student, a key member of our research team, you will contribute to the development and testing of cutting-edge Artificial Intelligence (AI) systems at the edge of the network. You will work closely with our researchers and engineers to design, implement, and evaluate innovative AI solutions that can operate efficiently on resource-constrained edge devices.

Responsibilities:

  • Assist in designing and implementing AI models for edge computing
  • Develop and test software components for the Edge AI Testbed
  • Collaborate with team members to integrate AI models with edge hardware platforms
  • Participate in performance optimization and evaluation of AI systems on edge devices
  • Contribute to the development of tools and scripts for automated testing and deployment
  • Document and report on project progress, results, and findings


If you are a motivated and talented student looking to gain hands-on experience in Edge AI, we encourage you to apply for this exciting opportunity!

Requirements:

  • Currently enrolled in a Bachelor's or Master's program in School of CIT
  • Strong programming skills in languages such as Python and C++
  • Experience with AI frameworks such as TensorFlow, PyTorch, or Keras
  • Familiarity with edge computing platforms and devices (e.g., Raspberry Pi, NVIDIA Jetson)
  • Basic knowledge of Linux operating systems and shell scripting
  • Excellent problem-solving skills and ability to work independently
  • Strong communication and teamwork skills


Nice to Have:

  • Experience with containerization using Docker
  • Familiarity with cloud computing platforms (e.g., Kubernetes)
  • Experience with Apache Ray
  • Knowledge of computer vision or natural language processing
  • Participation in open-source projects or personal projects related to AI and edge computing

 

Kontakt

Email: navid.asadi@tum.de

 

Betreuer:

Navidreza Asadi

An AI Benchmarking Suite for Microservices-Based Applications

Stichworte:
Kubernetes, Deep Learning, Video Analytics, Microservices
Kurzbeschreibung:
In the realm of AI applications, the deployment strategy significantly impacts performance metrics. This research internship aims to investigate and benchmark AI applications in two predominant deployment configurations: monolithic and microservices-based, specifically within Kubernetes environments. The central question revolves around understanding how these deployment strategies affect various performance metrics and determining the more efficient configuration. This inquiry is crucial as the deployment strategy plays a pivotal role in the operational efficiency of AI applications. Currently, the field lacks a comprehensive benchmarking suite that evaluates AI applications from an end-to-end deployment perspective. Our approach includes the development of a benchmarking suite tailored for microservice-based AI applications. This suite will capture metrics such as CPU/GPU/Memory utilization, interservice communication, end-to-end and per-service latency, and cache misses.

Beschreibung

In the realm of AI applications, the deployment strategy significantly impacts performance metrics.

This research internship aims to investigate and benchmark AI applications in two predominant deployment configurations: monolithic and microservices-based, specifically within Kubernetes environments.

The central question revolves around understanding how these deployment strategies affect various performance metrics and determining the more efficient configuration. This inquiry is crucial as the deployment strategy plays a pivotal role in the operational efficiency of AI applications.

Currently, the field lacks a comprehensive benchmarking suite that evaluates AI applications from an end-to-end deployment perspective. Our approach includes the development of a benchmarking suite tailored for microservice-based AI applications.

This suite will capture metrics such as CPU/GPU/Memory utilization, interservice communication, end-to-end and per-service latency, and cache misses.

 

 

Voraussetzungen

  • Familiarity with Kubernetes
  • Familiarity with Deep Learning frameworks (e.g., PyTorch or TensorFlow)
  • Basics of computer networking

 

Kontakt

Email: navid.asadi@tum.de

 

Betreuer:

Navidreza Asadi

Performance Evaluation of Serverless Frameworks

Stichworte:
Serverless, Function as a Service, Machine Learning, Distributed ML

Beschreibung

Serverless computing is a cloud computing paradigm that separates infrastructure management from software development and deployment. It offers advantages such as low development overhead, fine-grained unmanaged autoscaling, and reduced customer billing. From the cloud provider's perspective, serverless reduces operational costs through multi-tenant resource multiplexing and infrastructure heterogeneity.

However, the serverless paradigm also comes with its challenges. First, a systematic methodology is needed to assess the performance of heterogeneous open-source serverless solutions. To our knowledge, existing surveys need a thorough comparison between these frameworks. Second, there are inherent challenges associated with the serverless architecture, specifically due to its short-lived and stateless nature.

 Requirements:

  • Familiarity with Kubernetes
  • Basics of computer networking

 

 

Kontakt

Email: navid.asadi@tum.de

 

Betreuer:

Navidreza Asadi

Investigation of Flexibility vs. Sustainability Tradeoffs in 6G

Beschreibung

5G networks brought significant performance improvements for different service types like augmented reality, virtual reality, online gaming, live video streaming, robotic surgeries, etc., by providing higher throughput, lower latency, higher reliability as well as the possibility to successfully serve a large number of users. However, these improvements do not come without any costs. The main consequence of satisfying the stringent traffic requirements of the aforementioned applications is excessive energy consumption.

Therefore, making the cellular networks sustainable, i.e., constraining their power consumption, is of utmost importance in the next generation of cellular networks, i.e., 6G. This goal is of interest mostly to cellular network operators. Of course, while achieving network sustainability, the satisfaction of all traffic requirements, which is of interest to cellular users, must be ensured at all times. While these are opposing goals, a certain balance has to be achieved.

In this thesis, the focus is on the type of services known as eMBB (enhanced mobile broadband). These are services that are characterized as latency-tolerant to a certain extent, but sensitive to the throughput and its stability. Live video streaming is a use case falling into this category. For these applications, on the one side, higher data rates imply higher energy consumption. On the other side, the users can be satisfied with slightly lower throughput as long as the provided data rate is constant, which corresponds to the flexibility that the network operator can exploit. Hence, the question that needs to be answered in this thesis is what is the optimal trade-off between the data rate and the energy consumption in a cellular network with eMBB users? To answer this question, the entire communication process will be encompassed, i.e., from the transmitting user through the base station and core network to the receiving end. The student will need to formulate an optimization problem to address the related problem, which they will then solve through exact optimization solvers, but also through proposing simpler algorithms (heuristics) that reduce the solution time while not considerably deteriorating the system performance.

Voraussetzungen

  • Good knowledge of any programming language
  • Good mathematical and analytical thinking skills
  • High level of self-engagement and motivation

Kontakt

valentin.haider@tum.de

fidan.mehmeti@tum.de

Betreuer:

Valentin Haider, Fidan Mehmeti

Assessing the suitability of Multipath TCP and QUIC for LiFi-WiFi networks

Beschreibung

In order to fully utilize the capabilities of a LiFi-WiFi network, user devices should be capable of using multiple network interfaces simultaneously. Thanks to multipath solutions like MPTCP and MPQUIC, this is possible.

The challenge in a multipath-enabled heterogeneous network lies in designing a policy to schedule
data packets onto the multiple paths with heterogeneous characteristics (eg. delay, packet loss).

The goal of this work is to compare and evaluate various multipath transport protocols on a LiFi-WiFi testbed and assess their suitability for heterogeneous wireless networks by analyzing the advantages and limitations of each protocol.

Related Reading:

  1. P. S. Kumar, N. Fatima and P. Saxena, "Performance analysis of Multipath Transport layer schedulers under 5G/B5G hybrid networks," 2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS), Bangalore, India, 2022, pp. 658-666, doi: 10.1109/COMSNETS53615.2022.9668483.
  2. Q. De Coninck and O. Bonaventure, "MultipathTester: Comparing MPTCP and MPQUIC in Mobile Environments," 2019 Network Traffic Measurement and Analysis Conference (TMA), Paris, France, 2019, pp. 221-226, doi: 10.23919/TMA.2019.8784653.
  3. T. Schmidt, J. Deutschmann, K. -S. Hielscher and R. German, "POSTER: Revisiting Multipath QUIC Experiments and Comparing them with more recent Multipath TCP Implementations," 2021 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN), Boston, MA, USA, 2021, pp. 1-2, doi: 10.1109/LANMAN52105.2021.9478815.

If you are interested in this work, please send me an email with a short introduction of yourself along with your CV and grade transcript.

Voraussetzungen

  • Experience with Linux networking
  • Strong foundation in wireless networking concepts
  • Availability to work in-presence

Betreuer:

Mobility-aware resource allocation in multipath LiFi-WiFi networks

Beschreibung

In order to fully utilize the capabilities of a LiFi-WiFi network, user devices should be capable of using multiple network interfaces simultaneously. Thanks to multipath solutions like MPTCP and MPQUIC, this is possible.

The challenge in a multipath-enabled heterogeneous network lies in designing a resource allocation scheme to manage resources of both technologies resulting in an optimal network.

The goal of this work is to develop a resource allocation framework in a python simulator to assign the users to access points and allocate wireless resources of both technologies to maximize the throughput of the network. The resource allocation scheme would be developed using multi-agent reinforcement learning and should be compared to an analytical scheme such as  Lagrangian optimization and an “optimal” scheme implemented with an off the shelf solver like Gurobi.

Related Reading:

  1. D. Frometa Fonseca, B. Genoves Guzman, G. Luca Martena, R. Bian, H. Haas and D. Giustiniano, "Prediction-model-assisted reinforcement learning algorithm for handover decision-making in hybrid LiFi and WiFi networks," in Journal of Optical Communications and Networking, vol. 16, no. 2, pp. 159-170, February 2024, doi: 10.1364/JOCN.495234.
  2. F. Jin, R. Zhang and L. Hanzo, "Resource Allocation Under Delay-Guarantee Constraints for Heterogeneous Visible-Light and RF Femtocell," in IEEE Transactions on Wireless Communications, vol. 14, no. 2, pp. 1020-1034, Feb. 2015, doi: 10.1109/TWC.2014.2363451.

If you are interested in this work, please send me an email with a short introduction of yourself along with your CV and grade transcript.

 

Voraussetzungen

  • Experience with programming in Python
  • Experience with reinforcement learning
  • Strong foundation in wireless networking concepts
  • Motivation to learn optimization concepts

Betreuer:

Network Planning in the Medical Context

Beschreibung

 

In future communication systems such as 6G, in-network computing will play a crucial role. In particular, processing units within the network enable to run applications such as digital twins close to the end user, leading to lower latencies and overall better performance.

 

 In this thesis, the task is to develop and evaluate an approach to dimension networking resources such as networking devices and processing units depending on the envisioned medical applications to be executed. This work is in cooperation with our partners at MITI (Hospital „Rechts der Isar“).

 

 The result will be an approach to dimension and plan networks for future medical applications. 

 

Voraussetzungen

 

·       Motivation

 

·       Ideally some experience in optimization problems

 

·       Basic networking knowledge

 

·       Basic programming skills

 

Betreuer:

Nicolai Kröger, Fidan Mehmeti

Optimizing the Availability of Medical Applications

Beschreibung

 

In future communication systems such as 6G, in-network computing will play a crucial role. In particular, processing units within the network enable to run applications such as digital twins close to the end user, leading to lower latencies and overall better performance.

 

 In this thesis, the task is to develop and evaluate an approach to optimize the availability  of medical applications, i.e., modular application functions (MAFs), when executed in the network. For that, suitable real use cases are identified together with our partners at MITI (Hospital "Rechts der Isar"). The optimizing approach then leads to a specified distribution of the processing and networking resources, satisfying the minimum needs of critical applications while considering the needed availability.

 

 The result will be an evaluated placement approach for applications in the medical environment considering the availability.

 

Voraussetzungen

 

·       Motivation

 

·       Ideally some experience in solving optimization problems

 

·       Basic networking knowledge

 

·       Basic programming skills

 

Betreuer:

Nicolai Kröger, Fidan Mehmeti

Minimizing the Power Consumption of Medical Applications

Beschreibung

 

In future communication systems such as 6G, in-network computing will play a crucial role. In particular, processing units within the network enable to run applications such as digital twins close to the end user, leading to lower latencies and overall better performance.

 

 In this thesis, the task is to develop and evaluate an approach to minimize the power consumptions  of medical applications, i.e., modular application functions (MAFs), when executed in the network. For that, suitable real use cases are identified together with our partners at MITI (Hospital "Rechts der Isar"). The optimizing approach then leads to a specified distribution of the processing and networking resources, satisfying the minimum needs of critical applications while considering the power consumption.

 

 The result will be an evaluated power minimizing approach for applications in the medical environment.

 

Voraussetzungen

 

·       Motivation

 

·       Ideally some experience in solving optimization problems

 

·       Basic networking knowledge

 

·       Basic programming skills

 

Betreuer:

Nicolai Kröger, Fidan Mehmeti

In-Network Placement of Medical Applications

Beschreibung

 

In future communication systems such as 6G, in-network computing will play a crucial role. In particular, processing units within the network enable to run applications such as digital twins close to the end user, leading to lower latencies and overall better performance.

 

 In this thesis, the task is to place medical applications, i.e., modular application functions (MAFs), in the networking considering various parameters similar to [1]. For that, suitable real use cases are identified together with our partners at MITI (Hospital "Rechts der Isar"). The optimizing approach then leads to a specified distribution of the processing and networking resources, considering various important parameters.

 

 The result will be an evaluated placement approach for applications in the medical environment.

 

 

 

[1] A. Hentati, A. Ebrahimzadeh, R. H. Glitho, F. Belqasmi and R. Mizouni, "Remote Robotic Surgery: Joint Placement and Scheduling of VNF-FGs," 2022 18th International Conference on Network and Service Management (CNSM), Thessaloniki, Greece, 2022, pp. 205-211, doi: 10.23919/CNSM55787.2022.9964591.

 

Voraussetzungen

 

·       Motivation

 

·       Ideally some experience in solving optimization problems

 

·       Basic networking knowledge

 

·       Basic programming skills

 

Betreuer:

Nicolai Kröger, Fidan Mehmeti

Processing Priorization of MAF Chains in the Medical Context

Beschreibung

 

In future communication systems such as 6G, in-network computing will play a crucial role. In particular, processing units within the network enable to run applications such as digital twins close to the end user, leading to lower latencies and overall better performance. However, these processing resources are usually shared among many applications, which potentially leads to worse performance in terms of execution time, throughput, etc. . This is especially critical for applications such as autonomous driving, telemedicine or smart operations. Hence, the processing of more critical applications must be prioritized.

 

 In this thesis, the task is to develop and evaluate a priorization approach for chains  of modular medical applications, i.e., modular application functions (MAFs). Hereby, this work extends an already existing work, focusing on the placement of only single MAFs with prioritization. In this work, suitable real use cases are identified together with our partners at MITI (Hospital "Rechts der Isar"). The priorization approach then leads to a specified distribution of the processing and networking resources, satisfying the minimum needs of critical applications.

 

 The result will be an evaluated priorization approach for applications in the medical environment.

 

Voraussetzungen

 

·       Motivation

 

·       Ideally some experience in solving optimization problems

 

·       Basic networking knowledge

 

·       Basic programming skills

 

Betreuer:

Nicolai Kröger, Fidan Mehmeti

Detailed Requirement Analysis for the Reliability and Availability of Medical Network Communication

Beschreibung

 

6G soll als neuer und zukünftiger Mobilfunkstandard den Menschen in den Fokus rücken. Neben sehr geringen Latenzen und extrem großen Datenübertragungsraten wird das Netzwerk zuverlässiger, sicherer und dynamischer. Diese Eigenschaften sind besonders in der Medizin und der Medizingerätetechnik gefragt, um intelligente Datenübertragung zwischen Geräten und Menschen zu ermöglichen. Im Rahmen des Verbundprojektes „6G-life“ sollen zwei medizinische Demonstratoren entwickelt werden, die diese Netzwerkeigenschaften untersuchen. Ein Demonstrator ist ein robotisches Telediagnostiksystem zur Remote Untersuchung von Patienten. Ein zweiter Demonstrator beschäftigt sich mit der raumadaptiven Erfassung von Vitalparametern.

Ziel der Forschungspraxis ist die Ermittlung von medizintechnischen Anforderungen an die Netzwerkkommunikation hinsichtlich der Ausfallsicherheit. Dies beinhaltet eine Recherche gängiger Normen und Richtlinien, die bei der medizinischen Datenübertragung berücksichtigt werden müssen, sowie Maßnahmen, die zur Sicherstellung zuverlässiger Kommunikation getroffen werden können. Darüber hinaus sind Interviews mit Medizinern wünschenswert, um die Nutzerseite zu berücksichtigen.

 

Im Rahmen der Arbeit sollen folgende Punkte behandelt werden:

  • Recherche zu gängigen Richtlinien und Mechanismen, die in der medizintechnischen Netzwerkkommunikation zur Ausfallsicherheit eingesetzt werden.
  • Interviews mit Klinikpersonal
  • Evtl. Messung mit den vorhandenen Testbeds

 

Diese FP wird in Kooperation mit unseren Partnern der MITI Gruppe am Krankenhaus "Rechts der Isar" durchgeführt.

 

Voraussetzungen

  • Motivation
  • Interesse an Medizintechnik
  • Deutsch (zwingend erforderlich zwecks der Interviews)
  • Grundlegende Kenntnisse über Netzwerkkonzepte

 

Betreuer:

Nicolai Kröger - Franziska Jurosch (MITI)

Intel's IPU: Starting from the beginning

Beschreibung

Intel develops Network Devices consisting of an FPGA and a general purpose processor. These are the so called IPUs. The goal of this Thesis/Position is to get such an IPU (Intel IPU F2000X) up and running and evaluates its potential. Here, the goal is to program a custom IPU application and evaluate metrics like latency, throughput, and many more under varying circumstances.

Voraussetzungen

  • Basic Knowledge Linux Terminal
  • Basic Knowledge C/C++
  • Basic Knowledge of and about FPGAs

Betreuer:

DPU as Measurement Cards and Load Generators

Beschreibung

Datacenters experience higher and more demanding Network Loads and Traffic. Companies like Nvidia developed special networking hardware to fulfill these demands (The Nvidia Bluefield Line-Up). These cards promise high throughput and high precision. The features required to achieve such tasks can also be used to use Bluefield Cards as potential measurement cards or as load generators.

The goal of this Thesis/Position is to evaluate the performance and feasibility of this approach

For more information, please contact me directly (philip.diederich@tum.de)

Voraussetzungen

  • Basic Knowledge Linux Terminal
  • Basic Knowledge Python
  • Basic Knowledge C/C++

Betreuer:

Advancing Real-time Network Simulations to Real World Behaviour

Beschreibung

Testing real-time application and networks is very timing sensitive. It is very hard to get this precision and accuracy in the real-world. However, the real-world itself also behaves different then simualtions. Our Simulator behaves like the theory dictates and allows us to get these precise timing, but needs to be tested and exteded to behave more like a real-network would

 

Requirements

  • Knowledge of NS-3
  • Knowledge of Python
  • Knowledge of C/C++

 

Please contact me for more information (philip.diederich@tum.de)

Betreuer:

Working Student - Real-Time Network Controller for Research

Beschreibung

Chameleon is a real-time network controller that guarantees packet latencies for admitted flows. However, Chameleon is designed to work in high performance environments. For research and development, a different approach that offers more debugging and extension capablites would suit us better.

Goals:

  • Create Real-time Network Controller
  • Controller needs to be easy to debug
  • Controller needs to be easy to extend
  • Controller needs to have good logging and tracing

 

Requirements:

  • Advanced Knowledge of C/C++
  • Advanced Knowledge of Python

 

Please contact me for more information (philip.diederich@tum.de)

 

Amaury Van Bemten, Nemanja Ðeri?, Amir Varasteh, Stefan Schmid, Carmen Mas-Machuca, Andreas Blenk, and Wolfgang Kellerer. 2020. Chameleon: Predictable Latency and High Utilization with Queue-Aware and Adaptive Source Routing. In The 16th International Conference on emerging Networking EXperiments and Technologies (CoNEXT ’20), December 1–4, 2020, Barcelona, Spain. ACM, New York, NY, USA, 15 pages. https://doi.org/10.1145/3386367. 3432879

Betreuer:

Controlling Stochastic Network Flows for Real-time Networking

Beschreibung

Any data that is sent in a real-time network is monitored and accounted for. This allows us with the help of some mathematical frameworks to calculate upper bounds for the latency of the flow. These frameworks and controllers often consider hard real-time guarantees. This means that every packet arrives in time every time. With soft real-time guarantees, this is not the case. Here, we are allowed to have some leeway

In this thesis, we want to explore how we can model and admit network flows that have a stochastical nature.

 

Please contact me for more information (philip.diederich@tum.de)!!

Betreuer:

Working Student: Framework for Testing Realtime Networks

Beschreibung

Testing a Network Controller, custom real-time protocols, or verifying simulations with emulations requires a lot of computing effort. This is why we are developing a framework that helps you run parallel networking experiments. This framework also increases the reproducibility of any networking experiment.

The main Task of this position is to help develop the general-purpose framework for executing parallel networking experiments.

Tasks:

  • Continue developing the Framework for multi server / multi app usage
  • Extend Web Capabilities of the Framework
  • Automate Starting and Stopping
  • Ease-of-use Improvements
  • Test the functionality

 

Requirements:

  • Knowledge of Python
  • Basic Knowledge of Web-App Development (FastApi, React etc...)
  • Basic Knowledge of System Architecture Development

 

Feel free to contact me per mail (philip.diederich@tum.de)

Betreuer:

Working Student Infrastructure Service Management

Beschreibung

We are seeking a highly motivated and detail-oriented Working Student to join our data center team. As a Working Student, you will assist in the daily operations of our data center, gaining hands-on experience in a fast-paced and dynamic environment.

Responsibilities:

  Assist with regular data center tasks, such as.

  • Rack and Stack equipment
  • Cable Management and organization
  • Perform basic troubleshooting and maintenance tasks
  • Assist with inventory management

 

  • Monitor data center systems and report any discrepancies or issues
  • Create the basis for our Data Center Infrastructure Management
  • Develop and maintain documentation of data center procedures and policies
  • Perform other duties as required to support the data center operations

Requirements

 

  • Availability to work 8 - 10 hours per week with flexible scheduling to accommodate academic commitments
  • Basic knowledge of computer systems, networks, and data center operations
  • Basic knowledge in Python

 

Betreuer:

Working Student for Analysis, Modeling and Simulation of Communication Networks SS2024

Beschreibung

The primary responsibilities of a working student include assisting tutors in correcting programming assignments and answering questions in Moodle. Working time is 6-7 hours per week in the period from May to July.

Voraussetzungen

  • Python knowledge

Kontakt

polina.kutsevol@tum.de

Betreuer:

Polina Kutsevol

Student Assistent for Wireless Sensor Networks Lab Winter Semester 24/25

Beschreibung

The Wireless Sensor Networks lab offers the opportunity to develop software solutions for the wireless sensor networking system, targeting innovative applications. For the next semester, a position is available to assist the participants in learning the programming environment and during the project development phase. The lab is planned to be held on-site every Tuesday 15:00 to 17:00.

Voraussetzungen

  • Solid knowledge in Wireless Communication: PHY, MAC, and network layers.
  • Solid programming skills: C/C++.
  • Linux knowledge.
  • Experience with embedded systems and microcontroller programming knowledge is preferable.

 

Kontakt

yash.deshpande@tum.de

alexander.wietfeld@tum.de

Betreuer:

Yash Deshpande, Alexander Wietfeld

Demo Implementation: Network Planning For The Future Railway Communications

Stichworte:
Demo, GUI, Web
Kurzbeschreibung:
This works consists on the implementation of a demo for the work on Network Planning For The Future Railway Communications

Beschreibung

This works consists on the implementation of a demo for the work on Network Planning For The Future Railway Communications.

The idea is to program a web GUI, where the users can plan the network and examine its performance under dynamic scenarios.

An example of the expected outcome can be found here.

Please send your CV and transcript of records.

Voraussetzungen

Basic knowledge on the following:

  • Linux
  • Python
  • Web programming (GUI)
  • GIT

Kontakt

Betreuer:

Cristian Bermudez Serna

Development of a GUI for Monitoring and Debugging a Digital Twin of QKD Networks

Stichworte:
GUI
Kurzbeschreibung:
Quantum key distribution (QKD) is a promising technology for providing secure communication also in the presence of powerful quantum computers. Due to its time-dependent behavior and multi-layer architecture, analysis of routing policies and network performance parameters can be done by emulation. Our implemented network emulator based on container and network function virtualization allows network performance parameters analysis and routing policy optimization.

Beschreibung

We search for a student to build a GUI, simplifying analysis and interaction with the network emulator. The emulator is based on Containernet and includes QKD-specific network function virtualization. Currently, distributed routing is supported but will be extended by centralized routing. Monitoring data from active QKD-links are fed in to mirror realistic circumstances.

  • Build a front-end displaying performance and operational data
  • Build a GUI for dynamically changing secret key rates 

Voraussetzungen

  • Programming skills in Python
  • Experience in front-end web development
  • Interest in security and practical concepts of guaranteed security

 

Kontakt

Mario Wenning mario.wenning@tum.de

Betreuer:

Mario Wenning

Distributed Deep Learning for Video Analytics

Stichworte:
Distributed Deep Learning, Distributed Computing, Video Analytics, Edge Computing, Edge AI

Beschreibung

In recent years, deep learning-based algorithms have demonstrated superior accuracy in video analysis tasks, and scaling up such models; i.e., designing and training larger models with more parameters, can improve their accuracy even more.

On the other hand, due to strict latency requirements as well as privacy concerns, there is a tendency towards deploying video analysis tasks close to data sources; i.e., at the edge. However, compared to dedicated cloud infrastructures, edge devices (e.g., smartphones and IoT devices) as well as edge clouds are constrained in terms of compute, memory and storage resources, which consequently leads to a trade-off between response time and accuracy. 

Considering video analysis tasks such as image classification and object detection as the application at the heart of this project, the goal is to evaluate different deep learning model distribution techniques for a scenario of interest.

Kontakt

Email: navid.asadi@tum.de

 

Betreuer:

Navidreza Asadi

Edge AI in Adversarial Environment: A Simplistic Byzantine Scenario

Stichworte:
Distributed Deep Learning, Distributed Computing, Byzantine Attack, Adversarial Inference

Beschreibung

This project considers an environment consisting of several low performance machines which are connected together across a network. 

Edge AI has drawn the attention of both academia and industry as a way to bring intelligence to edge devices to enhance data privacy as well as latency. 

Prior works investigated on improving accuracy-latency trade-off of Edge AI by distributing a model into multiple available and idle machines. Building on top of those works, this project adds one more dimension: a scenario where $f$ out of $n$ contributing nodes are adversary. 

Therefore, for each data sample an adversary (1) may not provide an output (can also be considered as a faulty node.) or (2) may provide an arbitrary (i.e., randomly generated) output.

The goal is to evaluate robustness of different parallelism techniques in terms of achievable accuracy in presence of malicious contributors and/or faulty nodes.

Note that contrary to the mainstream existing literature, this project mainly focuses on the inference (i.e., serving) phase of deep learning algorithms, and although robustness of the training phase can be considered as well, it has a much lower priority.

Kontakt

Email: navid.asadi@tum.de

 

Betreuer:

Navidreza Asadi

On the Efficiency of Deep Learning Parallelism Schemes

Stichworte:
Distributed Deep Learning, Parallel Computing, Inference, AI Serving

Beschreibung

Deep Learning models are becoming increasingly larger so that most of the state-of-the-art model architectures are either too big to be deployed on a single machine or cause performance issues such as undesired delays.

This is not only true for the largest models being deployed in high performance cloud infrastructures but also for smaller and more efficient models that are designed to have fewer parameters (and hence, lower accuracy) to be deployed on edge devices.

That said, this project considers the second environment where there are multiple resource constrained machines connected through a network. 

Continuing the research towards distributing deep learning models into multiple machines, the objective is to generate more efficient variants/submodels compared to existing deep learning parallelism algorithms.  

Note that this project mainly focuses on the inference (i.e., serving) phase of deep learning algorithms, and although efficiency of the training phase can be considered as well, it has a much lower priority.

Kontakt

Email: navid.asadi@tum.de

 

Betreuer:

Navidreza Asadi

Optimizing Distributed Deep Learning Inference

Stichworte:
deep learning, distributed systems, parallel computing, model parallelism, communication overhead reduction, performance evaluation, edge devices

Beschreibung

The rapid growth in size and complexity of deep learning models has led to significant challenges in deploying these architectures across resource-constrained machines interconnected through a network. This research project focuses on optimizing the deployment of deep learning models at the edge, where limited computational resources and high-latency networks hinder performance. The main objective is to develop efficient distributed inference techniques that can overcome the limitations of edge devices, ensuring real-time processing and decision-making.

The successful candidate will work on addressing the following challenges:

  • Employing model parallelism techniques to distribute workload across compute nodes while minimizing communication overhead associated with exchanging intermediate tensors between nodes.
  • Reducing inter-operator blocking to improve overall system throughput.
  • Developing efficient compression techniques tailored for deep learning data exchanges to minimize network latency.
  • Evaluating the performance of proposed modifications using standard deep learning benchmarks and real-world datasets.

 

Responsibilities:

  • Implement and evaluate various parallelism techniques, such as model parallelism and variant parallelism, from a communication efficiency perspective.
  • Identify and implement mechanisms to minimize the exchange of intermediate tensors between compute nodes, potentially using advanced compression techniques tailored for deep learning data exchanges.
  • Conduct comprehensive performance evaluations of proposed modifications using standard deep learning benchmarks and real-world datasets. Assess improvements in latency, resource efficiency, and overall system throughput compared to baseline configurations.
  • Write technical reports and publications detailing the research findings.

Requirements:

  • Pursuing a Master's degree in School of CIT
  • Strong background in deep learning, distributed systems, and parallel computing.
  • Proficiency in Python and experience with deep learning frameworks (e.g., TensorFlow, PyTorch).
  • Excellent problem-solving skills and the ability to work independently and collaboratively as part of a team.
  • Strong communication and writing skills for technical reports and publications.

 

Kontakt

Email: navid.asadi@tum.de

Betreuer:

Navidreza Asadi

Laufende Arbeiten (bereits vergeben)

Bachelorarbeiten

_Bachelor‘s Thesis Autoencoder Optimized Error Concealment for Semantic Video Conferencing

Beschreibung

Semantic communication enables communication of discrete symbols. Even when a proportion of symbols are lost, an appropriate synthesis of the intended meaning is possible.

Error concealment attempts to minimize the impact of errors (symbol loss), by approximating lost symbols.

This thesis applies machine-learning to the hypothesis that:
If semantic symbols are lost, given first order motion model video conferencing, then, with the aid of mutual information, temporal information, and the structure of semantic symbols, machine learning can be used to create an error concealment technique more performant than an algorithmic technique, because the patterns in the data are more complex than easily captureable algorithmically.

Betreuer:

Alexander Griessel

Handover with PMIPv6 in LDACS

Beschreibung

This thesis will focus on the next generation air to ground communication standard: LDACS. It specifically discusses the IP Layer of the LDACS and mobility mechanisms behind it which enable a seamless handover for the aircraft.

 

Betreuer:

Anna Prado, Hansini Vijayaraghavan - Thomas Richter (Rohde&Schwarz)

Implementation and Evaluation of a Particle-Based Simulator for Molecular Communication with Diffusion and Flow

Beschreibung

Implement a particle-based simulation framework for molecular communication networks:

 

 

Use e.g. Python or MATLAB

 

Main target scenario: cylindrical tube with multiple transmitters and receivers

 

Effects: Diffusion, laminar/uniform flow -> output: particle trajectories

 

Enable different types of transmitters and receivers (e.g. point, cross-sectional distribution, volume) Flexibility in placement of TX and RX and shape of the initial molecules distribution  

 

Implement and evaluate a non-orthogonal multiple access scheme based on the distance and the emitted number of molecules from each TX

Kontakt

alexander.wietfeld@tum.de

Betreuer:

Alexander Wietfeld

Experimental Evaluation of xApp-related Vulnerabilities in the O-RAN's RAN Intelligent Controller Implementation

Stichworte:
O-RAN, Security, RAN Intelligent Controller

Beschreibung

In previous mobile network generations, Radio Access Networks (RAN) have been treated as a proprietary, closed network segment that is specific to every operator. To accelerate development and innovation, new initiatives such as the O-RAN ALLIANCE were born, aiming to split the RAN into different components and standardize the open interfaces that connect them.

 

Fundamentally, O-RAN leverages the concept of Software Defined RAN (SD-RAN) by decoupling the RAN data plane from the control plane and introducing several new RAN-controlling components. One of the central components is the near real-time RAN Intelligent Controller (nearRT-RIC), which manages the RAN (network slices, handovers, etc). The nearRT-RIC is designed to allow both the use of traditional, rule-based policies and Machine Learning or data-driven ones to optimize the RAN operation. The logic of these policies is encapsulated in applications called xApps that run on the nearRT-RIC platform and can read and modify different parameters of the RAN.

 

While providing opportunities for efficient resource management, the nearRT-RIC is also a prospective target for attackers, because of its control power over the RAN. Specifically, an attack vector is a malicious xApp that can interfere with other legitimate xApps running on the nearRT-RIC.  

 

NearRT-RIC implementations are still in their infancy and suffer from bugs and security vulnerabilities. These vulnerabilities are also prevalent in open-source implementations such as O-RAN Software Community's (OSC) RIC [1], where malicious xApps may disrupt the nearRT-RIC operation. The H Release of the OSC nearRT-RIC suffers from two major vulnerabilities that can compromise the operation of the RIC and crash it [2]. Additionally, a crafted packet sent by an xApp can crash memcpy and implicitly the whole OSC nearRT-RIC [3]. Such vulnerabilities significantly hinder the wide-scale adoption and deployment of O-RAN.

Objectives

The goal of this student thesis is to reproduce the attacks discussed in [2] and [3] for the newer OSC nearRT-RIC I Release. Additionally, after reproducing the existing attacks and understanding the OSC RIC Platform, the student is expected to explore new attack attempts with the same goal of disrupting OSC nearRT-RIC. Special focus will be put on the critical components of the system, such as the Subscription Manager and Subscription Procedures, Routing Message Router, other xApps, and O1/A1/E2 Terminations.

 

---

[1] “O-RAN SC Projects,” https://docs.o-ran-sc.org/en/latest/projects.html#near-realtime-ran-intelligent-controller-ric, accessed: 2024-04-19.

[2] Hung, C.F., Chen, Y.R., Tseng, C.H., & Cheng, S.M. (2024). Security Threats to xApps Access Control and E2 Interface in O-RAN. IEEE Open Journal of the Communications Society, 5, 1197-1203.

[3] "Opening Critical Infrastructure: The Current State of Open RAN Security,” https://www.trendmicro.com/en us/research/23/l/the-current-state-of-open-ran-security.html, accessed: 2024-04-19.

 

Voraussetzungen

- Experience with Docker and Kubernetes

- Linux Knowledge

- C/C++ Knowledge is a plus

Kontakt

- Razvan-Mihai Ursu (razvan.ursu@tum.de)

Betreuer:

Razvan-Mihai Ursu

Dynamic Security Analysis in 5G RAN

Stichworte:
5G, SDR, Security, RAN

Beschreibung

 

The mobile security sector has uncovered numerous vulnerabilities within link and session-establishment protocols. These vulnerabilities can be exploited using software-defined radios (SDRs) to interfere with, impersonate, or flood layer-3 (L3) messages, compromising security and privacy. These risks persist even within the latest 5G mobile network standard. With affordable SDRs and open-source cellular software stacks readily accessible, the economic and technical obstacles to practical cellular attacks are relatively minimal. In this work, we would like to investigate the resource depletion and Denial-of-Service (DoS) attacks, that are well known in LTE [1], within 5G RAN. The main focus will be regarding the RRC and NAS protocol vulnerabilities that are mentioned in [1]. The expected results would be to recreate these attacks experimentally in our 5G RAN with srsRAN [2]. If time allows, further tests can be performed over campus network with commercial 5G RAN.

 

[1] H. Kim, J. Lee, E. Lee and Y. Kim, "Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane," 2019 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 2019, pp. 1153-1168, doi: 10.1109/SP.2019.00038.

 

[2] I. Gomez-Miguelez et al., “Srslte: An open-source platform for lte evolution and experimentation,” in Proc. of ACM WiNTECH, 2016.

 

 

 

 

 

 

Voraussetzungen

- C/C++ experience

- SDR experience is a plus

- 5G knowledge is a plus

Kontakt

- Serkut Ayvasik (serkut.ayvasik@tum.de)

- Nicolai Kroeger (nicolai.kroeger@tum.de)

Betreuer:

Serkut Ayvasik, Nicolai Kröger

Towards Improving Class Parallelism for Edge Environments

Stichworte:
Distributed ML, Parallel Computing, CNN, Deep Learning

Beschreibung

Main-stream serving paradigms for distributed models, such as data parallelism and model parallelism, are not suitable when it comes to inference for tasks that require low latency and have atomic input streams. A recent effort, Sensai, proposes a new generic approach called class parallelism that aims to distribute a base convolution neural network (CNN) model across several homogeneous machines.

    The model distribution paradigm decomposes a CNN into disconnected subnets, each responsible for predicting specific classes or groups of classes. They claim that this approach enables fast, in-parallel inference on live data with minimal communication overhead, significantly reducing inference latency on single data items without compromising accuracy.

    Class Parallelism, however, comes with its own set of challenges and limitations. For instance, since the generated models should be created in a homogeneous manner; they share similar characteristics. Further, regardless of the input, all sub-models have to be executed to get the final prediction, which directly impacts the robustness and scalability of the system.

    During the first stage of the thesis, our goal is to reproduce the results from the paper. Later, we want to improve the existing method to become more robust and possibly extend it to new use cases besides image classification. Finally, if time permits, we want to evaluate the trained models in an edge environment.

Betreuer:

Navidreza Asadi

Investigation of Various Resource Allocation Granularities in the Frequency Domain of a 5G Radio Access Network

Beschreibung

Resource efficiency is a key design principle for future 6G radio systems. To achieve resource efficiency, a high resource utilization must be accomplished. This can be realized by allocating exactly the number of resources to the various users, which are required by them. The number of required resources per user highly depends on the experienced channel conditions of a user, which can be determined by the Channel Quality Indicator (CQI) in the Downlink (DL). To determine the CQIs, reference signals are sent by the Base Station (BS) and the CQI is periodically reported by the User Equipemt (UE). CQI reporting can either be done for the entire Bandwidth Part (BWP), i.e., wideband CQI reporting, or for a subgroup of frequency resources, i.e., subband CQI reporting. In 5G Radio Access Networks (RANs), the unit of resource allocation in the frequency domain is a Resource Block Group (RBG), which consists of multiple Physical Resource Blocks (PRBs). The number of PRBs that make up a single RBG is fixed and depends on the employed Bandwidth Part (BWP) size [1]. Since the CQI determines how much data can be sent with a single RBG, it highly influences the number of required resources of a user. Hence, the accuracy and the granularity of the CQI in terms of the frequency spectrum impacts the overall resource utilization that can be achieved. Furthermore, the number of PRBs making up one RBG influences the achieved resource utilization, as the difference between the number of allocated resources and the number of required resources decreases with a decreasing level of granularity.   The goal of this thesis is to investigate the trade-off between a higher CQI reporting granularity, which comes with an increased signaling overhead, and the increased resource efficiency by achieving a better mapping between the actual channel conditions and the reported CQI value. Moreover, the impact of smaller RBG sizes should be compared against the increase in signaling overhead allowing for a more granular resource allocation. To this end, first, the student needs to gain a thorough understanding of the DL reference signals and CQI reporting in 5G as well as the DL resource allocation. This can be achieved by a detailed study of the ETSI 5G standards. Afterwards, the student is expected to conduct extensive simulations for different parameter settings to numerically evaluate the different trade-offs. Optionally, depending on the thesis progress, a similar analysis can be conducted for an UL setup or measurements can be conducted in a testbed setup that uses OpenAirInterface (OAI) [2].

References

[1] ETSI, “5G; NR; phyiscal layer procedures for data: 3GPP TS 38.214 version 17.5.0 release 17.” www.etsi.org, 2023. Technical Specification. [2] Open Air Interface, “OpenAirInterface | 5G software alliance for democratising wireless in- novation,” 2024. https://openairinterface.org [Accessed: January 31, 2024].

Betreuer:

Improving network availability- adding links

Stichworte:
availability, reliability,

Beschreibung

This work aims to find the best links that, when added to the network, improve the network availability.

 

Voraussetzungen

Communication Network Reliability course, Python, Integer Linear Programming

Kontakt

shakthivelu.janardhanan@tum.de

Betreuer:

Shakthivelu Janardhanan

Modeling and implementation of quantum entangled photon sources

Beschreibung

What are the different models for quantum entangled photon sources and how can they be implemented in a quantum networks simulator?

Betreuer:

Benedikt Baier

Data plane performance measurements

Stichworte:
P4, SDN
Kurzbeschreibung:
This work consists on performing measurements for a given P4 code on different devices.

Beschreibung

Software-Defined Networking (SDN) is a network paradigm where control and data planes are decoupled. The control plane consists on a controller, which manages network functionality and can be deployed in one or multiple servers. The data plane consists on forwarding devices which are instructed by the controller on how to forward traffic.

P4 is a domain-specific programming language, which can be used to define the functionality of forwarding devices as virtual or hardware switches and SmartNICs.

This work consists on performing measurements for a given P4 code on different devices. For that, an small P4-enabled virtual network will be used to perform some measurments. Later, data will be also collected from hardware devices as switchs and SmartNICs. Measurement should be depicted in a GUI for its subsequent analysis.

Voraussetzungen

Basic knowledge on the following:

  • Linux
  • Networking/SDN
  • Python/C
  • Web programming (GUI).

Please send your CV and transcript of records.

Kontakt

Betreuer:

Cristian Bermudez Serna

Measuring the Throughput of quantized neural networks on P4 devices

Beschreibung

Implement a quantized neural network in P4 and evaluate the throughput of feed-forward networks and networks with attention mechanisms on P4 hardware.

Betreuer:

An SCTP Load Balancer for Kubernetes to aid RAN-Core Communication

Stichworte:
5G, SCTP, Kubernetes, RAN, 5G Core, gNB, AMF

Beschreibung

Cloud Native deployments of the 5G Core network are gaining increasing interest and many providers are exploring these options. One of the key technologies that will be used to deploy these Networks, is Kubernetes (k8s).

In 5G, NG Application Protocol (NGAP) is used for the gNB-AMF (RAN-Core) communication. NGAP uses SCTP as a Transport Layer protocol. In order to load balance traffic coming from the gNB towards a resilient cluster of AMF instances, a L4 load balancer needs to be deployed in the Kubernetes Cluster.

The goal of this project is do develop a SCTP Load Balancer to be used in a 5G Core Network to aid the communication between the RAN and Core.
The project will be developed using the language Go (https://golang.org/).

Voraussetzungen

- General knowledge about Mobile Networks (RAN & Core).
- Good knowledge of Cloud Orchestration tools like Kuberentes.
- Strong programming skills. Knowledge of Go (https://golang.org/) is a plus.

Kontakt

endri.goshi@tum.de

Betreuer:

Endri Goshi

Development of an East/West API for SD-RAN control communication

Beschreibung

Software-Defined Radio Access Network (SD-RAN) is receiving a lot of attention in 5G networks, since it offers means for a more flexible and programmable mobile network architecture.

The heart of the SD-RAN architecture are the so called SD-RAN controllers. Currently, initial prototypes have been developed and used in commercial and academic testbeds. However, most of the solutions only contain a single SD-RAN controller. Nonetheless, a single controller becomes also a single point of failure for a system, not only due to potential controller failures but also due to a high load induced from the devices in the data plane.

To this end a multi-controller control plane often becomes a reasonable choice. However, a multi-controller control plane renders the communication among the controllers more challenging, since they need to often exchange control information with each other to keep an up to date network state. Unfortunately, currently there is no protocol available for such a communication.

The aim of this work is the development and implementation of an East/West API for SD-RAN controller communication according to 5G stardardization. The protocol should enable the exchange of infromation among the SD-RAN controllers regarding UEs, BSs, wireless channel state and allow for control plane migration among controllers.

Voraussetzungen

  • Experience with programming languages Python/C++.
  • Experience with socket programming.
  • Knowledge about SDN is a must.
  • Knowledge about 4G/5G networks is a plus.

Betreuer:

Masterarbeiten

Analysis and Optimization of Fiber-to-the-Room MAC protocols

Kurzbeschreibung:
The widespread deployment of Fiber-to-the-Home (FttH) in various markets has given consumers access to high-speed data connections over the extensive optical fiber-based core networks. End users usually access these networks with wireless devices using the 802.11 standard. However, as the next generation of IoT devices with VR and AI applications enter the market, the demand for improved bandwidth and latency has increased drastically.

Beschreibung

The widespread deployment of Fiber-to-the-Home (FttH) in various markets has given consumers access to high-speed data connections over the extensive optical fiber-based core networks. End users usually access these networks with wireless devices using the 802.11 standard. However, as the next generation of IoT devices with VR and AI applications enter the market, the demand for improved bandwidth and latency has increased drastically. This has led to the development of Fiber-to-the-Room (FttR) networks, which seek to extend the fiber connections closer to the terminal devices by eliminating the bottleneck caused by traditional ethernet and wireless access. Current implementations utilize a cascaded XGPON optical distribution network (ODN) in convergence with WiFi 6. The ONU at the user’s premises is replaced with a Main FttR Unit (MFU), which acts as the OLT for the Sub FttR Units (SFU) in each room using point-to-multipoint architecture. The SFUs convert the optical signals to baseband and retransmit the data as WiFi frames.

These solutions keep both MAC and PHY layers between the optical transport and WiFi completely separated without using any synergies. This introduces various limitations to the FttR setup, such as degraded data rates, jitter / latency, and high power consumption. To solve these problems, a centralized wireless - optical access network (C-WAN) has been conceptualized, where the MFU becomes a central controller to enable seamless roaming, with deterministic low latency transmission and gigabit coverage for the entire room. Within the scope of this solution, a cross-domain MAC layer between optical and WiFi has been proposed to implement dynamic resource management and scheduling. Such a centralized and converged MAC protocol must reduce overhead and optimize the framing of both physical layers to minimize the processing delay at the SFUs. This thesis aims to design and evaluate such a minimal optical access protocol with a centralized controller and test its performance in an FttR setup. The ns-3 network simulator is used within the context of this thesis to implement, simulate, and analyze the designed protocol with C++. Extensive modules that simulate both XGPON and WiFi 6 are already implemented in ns-3 and can be modified as required.

Kontakt

cristian.bermudez-serna@tum.de

Betreuer:

Cristian Bermudez Serna - Christian Bluemm (Huawei)

Analysing the 5G Roaming Control Plane Connections and Evaluating their Security Capabilities

Stichworte:
5G, Roaming, Core, Network Functions, IPX, SEPP, PRINS

Beschreibung

5G is the newest generation of mobile networks, allowing for higher data rates, lower latency and many new features like network slicing. Its central element is the 5G Core, which is a network of specialised Network Functions (NFs). One of these NFs is responsible for roaming connections. Roaming allows subscribers to connect to the internet via other network operators’ networks if they have a roaming agreement. Between two Public Land Mobile Networks (PLMNs) there are two standardised roaming modes: Local Break Out and Home Routed Roaming.

A major part of both roaming modes is the Security Edge Protection Proxy (SEPP), a 5G NF designed to establish and maintain a secure control plane connection between two PLMNs. Implementing it, or extending the existing implementation of Open5GS, will be an important part of this work. The SEPP is connected to other NFs in the same PLMN via Service Based Interfaces (SBIs) and to other PLMN’s SEPPs via the N32 interface.

Two SEPPs connections are divided into the N32-c and N32-f interfaces. Via N32-c, the connection is established and the security capabilities of N32-f are negotiated. All control messages between NFs of the visited and the home PLMN are transmitted via N32-f. While N32-c is secured with an end-to-end Transport Layer Security (TLS) connection, N32-f either uses the same security or, alternatively, a new 5G protocol named PRotocol for N32 INterconnect Security (PRINS). PRINS uses end-to-end application layer encryption and additionally hop-to-hop TLS encryption. While one direct TLS connection is more secure, it relies on a direct link between both parties. Considering a roaming scenario with two countries separated by multiple thousand kilometres, direct links are not always feasible. Alternatively, two PLMNs are connected via IP Exchange Networks (IPXs). To be able to route the packets reliably to their respective destinations, the IPX providers have to have access to the packets’ data. PRINS aims to provide security for this option by using the Javascript Object Signing and Encryption (JOSE) framework.

 

This work aims to implement N32-c and both options for the N32-f interface and investigate their differences regarding security, operability, and performance.

Voraussetzungen

Basic understanding of 5G networks advantageous; especially of the 5G core network

– interest and motivation to learn the system are sufficient

 

  • Programming knowledge in C useful (for Open5GS)
  • Interest in roaming functionalities and their security

Kontakt

Oliver Zeidler (oliver.zeidler@tum.de)

Betreuer:

Oliver Zeidler

Implementing and Evaluating 5G Roaming Scenarios in an Open Source Testbed

Stichworte:
5G, Roaming, Core Network, Network Functions

Beschreibung

5G is the newest generation of mobile networks, allowing for higher data rates, lower latency and many new features like network slicing. Its central element is the 5G Core, which is a network of specialised Network Functions (NFs). One of these NFs is responsible for roaming connections. Roaming allows subscribers to connect to the internet via other network operators’ networks if they have a roaming agreement. Between two Public Land Mobile Networks (PLMNs), there are two standardised Roaming modes: Local Break Out and Home Routed Roaming. For Local Break Out Roaming, only the home network’s control plane is accessed from the visited network, while the user data is directly transmitted to the Data Network (DN). For Home Routed Roaming, the user data is routed through the home network to the DN. This thesis aims to implement both Roaming versions in an open-source core network and compare them regarding chosen KPIs, e.g., latency or throughput. Open5GS would be the primary choice for the open-source core network, as it already supports Local Break Out Roaming. Home Routed Roaming is not yet supported.

A major part of 5G roaming is the Security Edge Protection Proxy (SEPP), a 5G NF designed to establish and maintain a secure control plane connection between two PLMNs. Implementing it, or extending the existing implementation of Open5GS, will be an important part of this work. The SEPP is connected to other NFs in the same PLMN via Service Based Interfaces (SBIs) and to other PLMN’s SEPPs via the N32 interface.

The biggest difference between the two roaming scenarios lies in the data plane routing, so implementing the connection between two User Plane Functions (UPFs), the N9 interface, is necessary to connect two PLMNs. The newly introduced Inter PLMN User Plane Security (IPUPS) used for additional security on this connection is initially considered out-of-scope for this work but may be added later.

 

A security analysis regarding control and user plane for both roaming modes finishes this work’s contributions. Potential focal points are the control capabilities of the home PLMN operator in Local Break Out Roaming.

Voraussetzungen

• Basic understanding of 5G networks advantageous; especially of the 5G core network

  • interest and motivation to learn the system are sufficient

• Programming knowledge in C useful (for Open5GS)

• Interest in Roaming functionalities

• Interest in security would be nice, but is not needed (not the main focus of the work

Kontakt

Oliver Zeidler (oliver.zeidler@tum.de)

Julian Sturm (julian.sturm@tum.de)

Betreuer:

Oliver Zeidler

Combined Scheduling of PSFP and TAS

Stichworte:
TSN, TAS, PSFP
Kurzbeschreibung:
Develop and implemented an algorithm to define a combined TAS and PSFP schedule.

Beschreibung

Time Sensitive Networking (TSN) provides a variety of different mechanisms providing real-time communication. Especially, TSN is able to transmit periodic time-triggered traffic with strict real-time requirements.

This thesis focuses on the time-aware shaper (TAS) standardized in IEEE 802.1Qbv and the per-stream filtering and policing (PSFP) mechanism defined in IEEE 802.1Qci. The goal is to develop an algorithm combining a TAS and a PSFP schedule. The TAS schedule should be secured by a time-based PSFP schedule. The PSFP schedule should drop frames or reduce their priority which are not matching the expected arrival interval.
The algorithm has to be evaluated in a testbed considering traffic scenarios with multiple time-triggered streams.

Betreuer:

Laura Becker, Yash Deshpande - Manuel Eppler (Siemens AG)

VM Selection for Financial Exchanges in the Cloud

Stichworte:
Cloud Computing, Financial Exchange, Fairness, Subset Selection

Beschreibung

Financial exchanges consider a migration to the cloud for scalability, robustness, and cost-efficiency. Jasper presents a scalable and fair multicast solution for cloud-based exchanges, addressing the lack of cloud-native mechanisms for such.

To achieve this, Jasper employs an overlay multicast tree, leveraging clock synchronization, kernel-bypass techniques, and more. However, there are opportunities for enhancement by confronting the issue of inconsistent VM performance within identical instances. LemonDrop tackles this problem, detecting under-performing VMs in a cluster and selecting a subset of VMs optimized for a given application's latency needs. Yet, we believe that LemonDrop's approach of using time-expensive all-to-all latency measurements and an optimization routine for the framed Quadratic Assignment Problem (QAP) is overly complex. 

The proposed work aims to develop a simpler and scalable heuristic, that achieves reasonably good results within Jasper's time constraints. 

Kontakt

Email: navid.asadi@tum.de

 

Betreuer:

Navidreza Asadi

Towards Improving Model Generation in Variant Parallelism

Stichworte:
Distributed Deep Learning, Parallel Computing, Inference, Communication Efficiency

Beschreibung

Resource constraints of edge devices serve as a major bottleneck when deploying large AI models in edge computing scenarios. Not only are they difficult to fit into such small devices, but they are also quite slow in inference time, given today's need for rapid decision-making. One major technique developed to solve this issue is Variant Parallelism. In this ensemble-based deep-learning distribution method, different main model variants are created and deployed in separate machines, and their decisions are combined to produce the final output. 

    The method provides graceful degradation in the presence of faulty nodes or poor connectivity while achieving an accuracy similar to the base model.

    However, the technique used to generate variants can fail in scalability as combining variants of smaller size with somewhat identical characteristics may not help achieve a significant accuracy boost unless they are retrained with different random seeds. Therefore, this research will focus on improving variant parallelism by exploring other ways to generate variants. We will apply knowledge distillation (KD), where a teacher model of a certain type (e.g., ResNet-50) can be used to train a smaller student model or a model of a completely different structure (e.g., MobileNet). 

    We aim to develop a variant generation technique where we can generate as many variants as there are participating devices while boosting accuracy and inference speed. Additionally, we will create an optimization scenario that dynamically creates a smaller student model based on specific requirements, such as hardware characteristics and end-to-end performance metrics.

Betreuer:

Navidreza Asadi

Possibilities of Localization Mechanisms in a 5G Lab Environment

Beschreibung

Mobile networks have long provided mechanisms for localization. This capability has been improved with LTE and new features in 5G allow even better positioning.

While some positioning methods are hard to recreate in a lab environment (such as AoA), others are possible (e.g. E-CID). One goal is to identify which can be recreated on-site.

Additionally, not much is known about the prevalence of support for these localization mechanisms.

According to their documentation, the Amarisoft Callbox supports the NL1-Interface between an external LMF and the built-in AMF. This can be used for an early prototype.

Minimum goals:

·         Implement LMF that is able to interact with Amarisoft Callbox over NL1

·         Evaluate which localization methods are suitable for lab-based testing

·         Evaluate the prevalence of advertised localization mechanisms in commercial UEs

·         Evaluate the implementation status of localization mechanisms in commercial UEs

·         Evaluate if results can be explained by OS, Baseband or other factors

·         Find and evaluate possible attacks on the UEs location privacy

 

Extended goals:

·         Implement LPP into Open5GS with AmariRAN or Open5GS with OAI

·         Implement Demo into the 5GCube framework

Betreuer:

Oliver Zeidler - Julian Sturm ()

Planning and Evaluation of Unbalanced and Balanced PON for Rural Areas

Stichworte:
Optical Access Network
Kurzbeschreibung:
With the increasing need for broadband in rural areas and the shift towards fiber-based Passive Optical Networks (PON), this research will focus on the deployment strategies of Balanced PON (BPON) and Unbalanced PON (UPON). The aim is to enhance efficiency and minimize infrastructure costs associated with broadband deployment. Recognizing the high expense associated with fiber deployment, especially in rural areas where geographical and demographic factors pose significant challenges, this study will focus on a shift from the conventional BPON approach, characterized by uniform power splitting (e.g., 1:16 or 1:32 splitting), to a more adaptable UPON strategy. The UPON architecture facilitates variable power splitting ratios, enhancing network reach and optimizing the distribution of network resources—such as bandwidth and optical power—in rural areas, where the distances between Optical Network Units (ONUs) or customer premises are greater than those in urban settings.

Beschreibung

With the increasing need for broadband in rural areas and the shift towards fiber-based Passive Optical Networks (PON), this research will focus on the deployment strategies of Balanced PON (BPON) and Unbalanced PON (UPON). The aim is to enhance efficiency and minimize infrastructure costs associated with broadband deployment. Recognizing the high expense associated with fiber deployment, especially in rural areas where geographical and demographic factors pose significant challenges, this study will focus on a shift from the conventional BPON approach, characterized by uniform power splitting (e.g., 1:16 or 1:32 splitting), to a more adaptable UPON strategy. The UPON architecture facilitates variable power splitting ratios, enhancing network reach and optimizing the distribution of network resources—such as bandwidth and optical power—in rural areas, where the distances between Optical Network Units (ONUs) or customer premises are greater than those in urban settings.

The methodology includes gathering detailed rural area data from OpenStreetMap to simulate realistic network designs, including the strategic placement of Optical Line Terminals (OLTs), splitters, and Optical Network Units (ONUs). The research will compare the traditional BPON, both single and cascading splitting, against UPON in terms of fiber length utilization, network elements placement strategy, power distribution efficiency, and overall cost-effectiveness. By using Gabriel graphs to generate rural area networks and analyzing PON equipment parameters like transmitted power range, sensitivity, and fiber attenuation, this research will be dedicated to identifying the most efficient, unprotected, optical access network configurations for rural settings. The research will also consider the potential of merging BPON and UPON strategies, aiming to harness the combined benefits of both architectures for a more versatile and cost-effective rural broadband deployment.

This comparative analysis is expected to keen insights into the scalability of BPON and UPON solutions, guiding network operators toward more informed infrastructure development decisions in rural settings. By analyzing multiple Gabriel graphs to evaluate total fiber length, splitter requirements, and infrastructure cost, this research aims to derive comprehensive guidelines for efficient fiber deployment in rural areas. These guidelines will contribute to internet access deployment strategies and help narrow the digital divide, showcasing UPON as an affordable and practical solution for rural broadband. By aligning with initiatives like the Broadband Programs in Germany and Bavaria, this research underscores the global effort to extend high-quality internet connectivity to underserved areas. [1] This analysis will thus empower network operators with the knowledge to select the most appropriate PON configuration for rural deployments, ensuring efficient, reliable, and affordable broadband access.

References:


[1] "State aid: Commission approves German scheme for very high capacity broadband networks in Bavaria." The European Sting, 29 Nov. 2019,
https://ec.europa.eu/commission/presscorner/detail/en/ip_19_6630.

Voraussetzungen

Knowledge of:

  • Python
  • Object Oriented Programming
  • GIT
  • Optical Networks
  • Linux

Kontakt

cristian.bermudez-serna@tum.de

Betreuer:

Cristian Bermudez Serna

Electrical Network and Optical Network Dependability

Stichworte:
Optical Access Network
Kurzbeschreibung:
The dependability that the electrical and optical networks have on each other is a critical factor in ensuring uninterrupted services to the large population of the landscape of urban infrastructure. This thesis aims to delve into the complexity of different protection schemes in optical networks and explore their interconnection with electrical networks through different kinds of failures. The motivation behind this thesis comes from the increasing reliance on digital and electrical services, making the importance of the robustness of the underlying infrastructure very critical. Additionally, the focus will be on urban areas due to their large number of population and complex infrastructural needs.

Beschreibung

The dependability that the electrical and optical networks have on each other is a critical factor in ensuring uninterrupted services to the large population of the landscape of urban infrastructure. This thesis aims to delve into the complexity of different protection schemes in optical networks and explore their interconnection with electrical networks through different kinds of failures. The motivation behind this thesis comes from the increasing reliance on digital and electrical services, making the importance of the robustness of the underlying infrastructure very critical. Additionally, the focus will be on urban areas due to their large number of population and complex infrastructural needs.

 

Protection schemes


Optical networks are backbone technologies that provide telecommunication services to urban areas and to safeguard these networks from failures and ensure continuity, different protection schemes are implemented.

  • Unprotected scheme: Basic configuration without any backup paths for the feeder fiber, leaving the network vulnerable to service disruptions.
  • Type A Protection (Feeder Fiber Protection): Incorporates a backup path for the feeder fiber's working path, enhancing reliability.
  • Type B Protection (Dual Parented): Each subscriber is connected to two Optical Line Terminals (OLTs) located in different geographical areas. This setup provides a secondary OLT as a backup, significantly reducing the risk of service interruption.
  • Type C Protection: Offers complete redundancy with two independent links extending to the subscriber's location, ensuring the highest level of network reliability.

The initial phase of this thesis involves mapping these protection schemes onto real-world urban layouts using OpenStreetMap data and Python scripting.

 

Failure Analysis and Impact Assessment

A critical aspect of network dependability is understanding how networks respond to failures and for this reason, this thesis implements different types of failures.
 

  • Node Failure: Focuses on the failure of Optical Line Terminals (OLTs) and Remote Nodes (RNs), excluding Optical Network Units (ONUs) since their failure impacts are isolated.
  • Edge Failure: Involves simulating failures of all network connections (edges) to assess the extent of impact on ONUs.
  • Disaster Failure: Examines the effects of large-scale disasters, using a defined centroid and radius, to determine the number of affected ONUs within the disaster zone.

 

To explain the impacts on network functionality and ONUs, for each failure type the thesis will present visualizations and statistical analysis like boxplots or histograms.
Interdependence with Electrical Networks Parallel to the exploration of optical networks, this thesis will study power network topologies, design constraints, and requirements necessary for integrating electrical network functionalities into the same urban layouts. Similar to the optical network, will simulate various power network failures and analyze their impacts on ONU connectivity. This approach aims to highlight and enhance the mutual dependability between electrical and optical networks, thereby increasing overall system robustness against failures.

All the work in this thesis is based on a combination of advanced scripting, data analysis libraries, and geospatial data sources to achieve its objectives. The primary tools and technologies used are Python, OpenStreetMap (OSM), and Python libraries. Some Python libraries are NetworkX which is used for creating and studying the structure of complex networks, and Pandas which is crucial for managing and analyzing the large datasets generated from OpenStreetMap and network simulations. Matplotlib and Seaborn to create static and interactive visualizations in Python.

 

Voraussetzungen

Knowledge of:

  • Python
  • Object Oriented Programming
  • GIT
  • Optical Networks
  • Linux

Kontakt

cristian.bermudez-serna@tum.de

Betreuer:

Cristian Bermudez Serna

A Novel Sparse dMIMO Transmission Scheme for Efficient Data Communication

Beschreibung

For 6G radio systems it is key to achieve high capacity, coverage and energy efficiency. Distributed massive MIMO (dMIMO) systems are one of the often proposed 6G concepts to help to achieve these challenging requirements. dMIMO is very similar to a JT CoMP system, which has been researched for many years even so the reported performance gains over classical mMIMO systems are typically small to moderate. There are a number of well known challenges like the high inter cooperation area interference, channel aging for a high number of involved radio channels, or, huge processing complexity due to the large size of the channel matrices for a high number of cooperating transmission points. To overcome at least some of these issues a novel so called ‘sparse’ dMIMO system has been proposed, where the conventional transmission of user data is replaced by a novel ‘start stop bit’ transmission scheme. The main feature is the sparse resource usage for data transmissions, which is interesting for dMIMO systems as it can help to significantly reduce the inter cooperation area interference by potentially 98%. Similarly, the complexity for the dMIMO precoding might be reduced by potentially 98% as most of the resource elements of a physical resource block will be set to zero, i.e., do not need any precoding. The scope of the master thesis is to evaluate the novel 6G sparse dMIMO concept, verify the claimed benefits, identify new challenges and potential new implementation concepts overcoming these challenges. Where useful, AI/ML based solutions should be applied to achieve highest performance with lowest complexity.

Betreuer:

Valentin Haider - Wolfgang Zirwas, Bernhard Wegmann, Brenda Vilas-Boas (Nokia)

Evaluation of Time Offset in 5G NR using USRPs

Kurzbeschreibung:
To evaluate the effect of Time Offset between base stations in 5G NR.

Beschreibung

The 3GPP standard has established a maximum time synchronization error, the indoor 5G network may be able to handle a higher value proposed by an earlier simulation. To validate and determine such a result, it is necessary to use real hardware to create a small network and test related aspects of it. Upper error limits serve a useful purpose in many network applications. The developer is able to establish the maximum permissible error by the network requirements to aid in the construction of networks.

Betreuer:

Yash Deshpande

RTT-guided Route Servers at IXPs

Beschreibung

Problem: BGP is performance-agnostic

Solution: incorporate a delay-related metric into the best-path selection process.

Approach: Estimate the round-trip prop_delay to destinations (/24s) within the routing table of the IXP

Goal: Evaluate if it is possible to outperform BGP’s route selection criterion, in terms of latency, with a measurement-based approach.

Betreuer:

Maximilian Stephan - Matthias Wichtlhuber (DE-CIX)

LFM Deep Dive: Understanding the Impact on 5G

Stichworte:
5G, AKA, LFM, Security

Beschreibung

Linkability of Failure Messages (LFM) is a security hole in the Authentication and Key Agreement (AKA) procedure.

The LFM flaw was first reported in 3G [2] and it has also been proven to work in 5G [1]. Compared to IMSI catchers, the use of the flaw for identifying nearby subscribers has two limitations: First, the attacker has to know the ID of a person of interest that they are looking for. Only these subscribers with known IDs can be detected, it is not possible to find the ID of a new subscriber without knowing / guessing it.

Second, LFM requires an attacker to probe every new device that connects to their fake base station for every ID that they are looking for. In addition to probing every new device, the attacker also needs to contact an authentic mobile network to obtain authentication requests for each person of interest.

Due to these limitations, the LFM flaw is less powerful than previously used IMSI catchers. The objective of this project is to examine the scalability and practicability of exploiting the flaw on a larger scale.

Betreuer:

Oliver Zeidler - Julian Sturm ()

Network Programmability-based Security Mechanisms in Optical Access Networks

Stichworte:
Network Programmability, Optical Access Networks, SDN, P4
Kurzbeschreibung:
The advent of Software-Defined Networking (SDN) has revolutionized the way networks are managed and secured. In the context of optical access networks, where performance and security are paramount, it is crucial to develop advanced mechanisms for safeguarding against threats like TCP-SYN flood attacks. This research proposal aims to investigate a novel approach to thwarting such attacks, leveraging SDN controllers and programmable switches, specifically in optical access networks.

Beschreibung

The advent of Software-Defined Networking (SDN) has revolutionized the way networks are managed and secured. In the context of optical access networks, where performance and security are paramount, it is crucial to develop advanced mechanisms for safeguarding against threats like TCP-SYN flood attacks. This research proposal aims to investigate a novel approach to thwarting such attacks, leveraging SDN controllers and programmable switches, specifically in optical access networks.

How can SDN controllers and programmable switches be employed to effectively detect and mitigate TCP-SYN flood attacks in optical access networks, utilizing authentication using a modified SYN-ACK exchange and actuating triggers, while maintaining network performance and reliability?

This research aims to contribute to the field of network security and SDN by providing a cutting-edge solution for mitigating TCP-SYN flood attacks in optical access networks. The expected outcomes include:

1. An innovative approach to SYN flood attack mitigation, leveraging SYN-ACK exchange and P4-based actuating triggers.

2. Insights into the performance and scalability of the proposed solution in optical access network scenarios.

3. A comprehensive evaluation of alternative SYN flood attack mitigation techniques, aiding network administrators in selecting the most appropriate method.

Voraussetzungen

  • Machine Learning
  • Python and P4 programming
  • Knowledge of Softrware-Defined Networking

 

Kontakt

cristian.bermudez-serna@tum.de

Betreuer:

Cristian Bermudez Serna

Exploration of Machine Learning for In-network Prediction and Classification

Stichworte:
Machine Learning, P4, SDN
Kurzbeschreibung:
A promising solution is to include a Machine Learning algorithm into the Data Plane. Specifically, Decision Trees (DT) and Random Forests (RF) can be used to do line-rate classification. Since Decision Trees do not require complex mathematical operations, they can be easily deployed into the programmable switches using P4 language. Either a per-packet or a per-flow approach, each with its advantages and its drawbacks, will automate the decision of the switch of how to handle the incoming traffic instead of always forwarding it first to the controller.

Beschreibung

Software defined networks (SDN) have made data traffic routing a lot more convenient. The functionality of the additional controller can be used e.g. for detecting network threats like DoS or also for load balancing by redirecting data traffic. The initial idea of SDNs is that each time a new packet enters the network the packet is first forwarded to the controller to be checked. The controller then decides on which route the packet shall be send inside the network or tells the network to drop the packet, for instance if it is a threat. Each of the switches then save this information in their match-action tables. However, this model cannot scale in large networks with thousands or even millions of different packets trafficking, since that would lead to an additional latency, if every single packet needs to be sent to the controller.

Therefore, a promising solution to improve the model is to include a Machine Learning algorithm into the process. Specifically, Decision Trees (DT) and Random Forests (RF) can be used to do this line-rate classification. Since Decision Trees do not require complex mathematical operations, they can be easily deployed into the programmable switches using P4 language. Either a per-packet or a per-flow approach, each with its advantages and its drawbacks, will automate the decision of the switch of how to handle the incoming traffic instead of always forwarding it first to the controller.

In this master thesis a realisation of a DT into the P4 switches will be tested. First a functioning DT based on a real data traffic dataset will be implemented. Both variations (per-packet/per-flow) will be taken into consideration. The second step will be to translate the algorithm into the P4 switches. Afterwards the prediction performance will be analysed. The final step will be to compare the ML approach to the non-ML approach and draw conclusions on the results.

Voraussetzungen

  • Machine Learning
  • Python and P4 programming
  • Knowledge of Softrware-Defined Networking

Kontakt

cristian.bermudez-serna@tum.de

Betreuer:

Cristian Bermudez Serna

Performance Evaluation of a 6G UAM Connected Sensor Fusion System

Beschreibung

The master thesis aims to develop a connected sensor fusion system focusing on its application in Urban Air Mobility localization. By gathering data from multiple sensors, the air vehicles (AVs) will be able to better estimate the airspace view and improve their route planning.  The performance of IoT protocols within the context of a 6G system will be assessed. The study also seeks to evaluate the impact of network performance factors, such as delay and packet loss, on the accuracy of the fusion data. Additionally, the thesis will investigate the impact of a semantic-aware transport layer on the performance of the fusion system. Ultimately, the research not only contributes to the advancement of UAM technology but also aligns with the emerging 6G paradigm, offering a more connected and efficient solution for tactical deconfliction in airspace navigation, making it safer and more reliable.

Betreuer:

Polina Kutsevol - Markus Klügel (Airbus)

Remote Monitoring of Correlated Sources Over Random Access Channels in IoT Systems

Beschreibung

The thesis studies a Markov model of two correlated sources (X and Y) transmitting the data over a wireless channel for remote estimation. The objective of the thesis is to develop a strong theoretical insight for modelling an estimator to optimize the errors and age of information in a wireless communication system. We aim at studying various estimation strategies to do so, and demonstrate the optimal method for the given conditions (such as correlation between the sources, and Markov model parameters). The implementation is carried out by simulating the abovementioned theoretical concepts in MATLAB under different conditions.

Betreuer:

Polina Kutsevol - Dr. Andrea Munari (DLR - Deutsches Zentrum für Luft- und Raumfahrt)

Analysis of UE-initiated Signaling Storms and Their Impact on 5G Network Security

Stichworte:
5G, Signaling Storm, UE initiated attacks, DDoS

Beschreibung

Signaling storm is a specific type of DDoS attack, which emerges from frequent small-scale signaling activities of a group of compromised UE. Typically, signaling messages are exchanged between UE and the network for establishing communication sessions and managing network resources. However, signaling attacks abuse regular procedures to generate high number of signaling messages within a short period. The generation of excessive signaling load increases the network congestion and consumes resources. In 5G, UEs must send a request to initiate themselves and establish the communication with the 5G core. These initial registration request messages contain UE related information about identity, location and capabilities. The recent research internship focused on signaling storms has revealed that an initial registration request flood can generate significant signaling load and stress the network core. In the scope of mentioned internship, a simulation environment was created using UERANSIM and open5GS to investigate the impact of repetitive initial registration requests from a botnet comprising hundreds of UEs on control plane resources. The master thesis involves a comprehensive research study based on this initial observation to identify other signaling attack scenarios initiated by UEs, that abuse regular UE signaling for registration processes, inter-slice handovers and mobility handovers. Furthermore, assessing the impact of these scenarios and exploring possible detection methodologies are crucial for the intended study.

Motivation: 5G networks are designed to be used for three types of connected services: Enhanced Mobile Broadband(eMBB), Ultra Reliable Low Latency Communications (URLLC) and Massive Machine Type Communications (mMTC). Higher throughput, reliable connections and low latency capabilities of 5G networks should meet uninterrupted and robust data exchange requirements of users. Both the industry and individual users heavily rely on seamless connectivity. However, numerous studies have shown that 5G networks are vulnerable to signaling threats and DDoS attacks, which are becoming more severe due to the growing number of mobile and IoT devices. Such attacks can increase latency and impact service availability. The majority of literature on this topic examines potential 5G threats including signal storms and their effect on users. Even some detection and prevention techniques have been proposed. Although these studies provide valuable information about signaling storms, it has not been particularly investigated how control plane resources can be exploited by flooding UE initiated and 5G protocol specific requests. The research gap regarding concrete statements to reproduce signaling attacks is the main motivation of this study.

Objectives and Research Question: This work will focus on UE initiated DDoS attacks targeting control plane resources of 5G networks and it will question if these attacks can have a severe impact on practical 5G test setup. Therefore, signaling procedures particularly the ones involving NAS and NGAP protocols, will be explored to identify scenarios for UE initiated signaling attacks. The characteristics of the identified scenarios will be derived by theoretical analysis. The remaining objectives are reproducing these scenarios conducting experiments with appropriate simulation tools, evaluating the impact of these attacks on the network and user experience and investigating detection solutions for signaling storms.

Challenges: The identified scenarios should be demonstrated and analyzed to study the research question, which poses two main challenges. Designing a simulation environment for realistic attack reproduction is elaborate, which requires determining the most suitable solution to simulate UE, gNB and 5GC among existing solutions. The simulation environment cannot completely replace the real 5G network and there will be some restrictions. Therefore, the second challenge is to design experiments in a way that allows the derivation of general statements about 5G security threats from observations made during the experiments

Contribution: This thesis will address the signaling attacks on the control plane of 5G networks by identifying concrete signaling scenarios to generate excessive packet floods, analyzing them, and demonstrating them to assess their impact on the network. The simulation environment will allow reproducing various attacks to derive characteristics of the attacks, which are required for detection by distinguishing between good and malicious communication patterns. Overall, this work will contribute to the improvement of network security.

Betreuer:

Oliver Zeidler, Maximilian Stephan - Tim Niehoff (IPOQUE)

Proactive load-aware wireless resource allocation for sustainable 6G network

Beschreibung

The rapid growth of traffic and the number of connected devices in the 5G and beyond wireless networks focus the attention on sustainability in the radio access network (RAN). Traffic load and status of available wireless resources in the network change rapidly, especially in scenarios with a large number of connections and high mobility. The high connectivity is caused by exponentially increasing Internet of Things (IoT) devices connected to the network for supporting various use cases ranging from Industry 4.0 to healthcare.

IoT devices mainly powered by batteries are characterized by low cost, low complexity, and limited computational resources. Therefore, elongating their lifetime while fulfilling the quality of service (QoS) requirements poses a new research challenge. To tackle this problem, context awareness of devices consisting of device type and mobility; and the network traffic load simultaneously enhance the wireless resource management and the management of the devices states. Moreover, to enable awareness of the neighboring cells, the predicted information on the traffic load can be exchanged among cells. The above affects the decisions of accepting the device or offloading it to the neighboring cell and the device's operating state.

In this thesis, the student will focus on developing and testing a context-aware resource allocation mechanism based on device mobility and traffic load, focusing on decreasing individual devices' energy consumption and reducing processing latency.

Voraussetzungen

  • Good knowledge of Python and Matlab programming.
  • Good mathematical background.
  • Knowledge of mobile networks.

Kontakt

alba.jano@tum.de

Betreuer:

Alba Jano

Sustainable Edge Network Orchestration in 5G with Performance Guarantees

Stichworte:
5G, 5G Edge, UPF, Optimization, Heuristic

Beschreibung

With the advent of 5G cellular networks, more stringent types of traffic, pertaining to applications like augmented reality, virtual reality, and online gaming, are being served nowadays. However, this comes with an increased energy consumption on both the user’s and network side, challenging this way the sustainability of cellular networks. Furthermore, the in-network computing aspect exacerbates things even further in that direction. 

Hence, it is very important to provide end-to-end sustainability, i.e., minimize the energy consumption in the network while maintaining performance guarantees, such as the maximum latency each flow should experience. This can be done, for example, depending on the traffic load in the network, and in order to keep the energy usage at low levels, the operator can decide to shut off certain network components, like User Plane Functions (UPFs) or edge clouds, and reassign the tasks to other entities. 

In this thesis, the focus will be on the core network. The aforementioned decisions will come up as solutions to optimization problems. To that end, the student will formulate optimization problems and solve them either analytically or using an optimization solver (e.g., Gurobi). The other part would be conducting realistic simulations and showing the improvements with our approach. 

Voraussetzungen

- Basic understanding of 5G Core Networks and Mobile Edge Computing (MEC).

- Experience with mathematical formulation of optimization problems.

- Programming experience with Python and Gurobi.

Betreuer:

Endri Goshi, Fidan Mehmeti

The Analysis of Dual Data Gathering Strategy for Internet-of-Things Devices in Status Update Systems

Beschreibung

The analysis of a dual data-gathering strategy for Internet-of-Things (IoT) devices in status update systems offers valuable insights into improving the efficiency and reliability of data collection in IoT environments. This thesis focuses on investigating the dual data gathering strategy, aiming to optimize the performance of status update systems in IoT deployments. The dual data-gathering strategy takes advantage of both local and remote processing capabilities. Using different source servers, this strategy aims to reduce energy consumption and network congestion in status update systems. The anticipated outcomes of this research include a comprehensive understanding of the dual data gathering strategy, mathematical models to analyze its performance, and insights into its practical implementation. These outcomes will not only advance the theoretical understanding of status update systems in IoT but also have practical implications for the design and deployment of IoT networks and applications.

Betreuer:

Polina Kutsevol - Dr. Andrea Munari (DLR - Deutsches Zentrum für Luft- und Raumfahrt)

Load Generation for Benchmarking Kubernetes Autoscaler

Stichworte:
Horizontal Pod Autoscaler (HPA), Kubernetes (K8s), Benchmarking

Beschreibung

Kubernetes (K8s) has become the de facto standard for orchestrating containerized applications. K8s is an open-source framework which among many features, provides automated scaling and management of services. 

Considering a microservice-based architecture, where each application is composed of multiple independent services (usually each service provides a single functionality), K8s' Horizontal Pod Autoscaler (HPA) can be leveraged to dynamically change the number of  instances (also known as Pods) based on workload and incoming request pattern.

The main focus of this project is to benchmark the HPA behavior of a Kubernetes cluster running a microservice-based application having multiple services chained together. That means, there is a dependency between multiple services, and by sending a request to a certain service, other services might be called once or multiple times.

This project aims to generate incoming request load patterns that lead to an increase in either the operational cost of the Kubernetes cluster or response time of the requests. This potentially helps to identify corner cases of the algorithm and/or weak spots of the system; hence called adversarial benchmarking.

The applications can be selected from commonly used benchmarks such as DeathStarBench*. The objective is to investigate on the dependencies between services and how different sequences of incoming request patterns can affect each service as well as the whole system.

* https://github.com/delimitrou/DeathStarBench/blob/master/hotelReservation/README.md

Betreuer:

Navidreza Asadi, Razvan-Mihai Ursu

End-to-End Scheduling in Large-Scale Deterministic Networks

Stichworte:
TSN, Scheduling, Industrial Networks
Kurzbeschreibung:
To evaluate APS in TSN Networks

Beschreibung

Providing Quality of Service (QoS) to emerging time-sensitive applications such as factory automation, telesurgery, and VR/AR applications is a challenging task [1]. Time Sensitive Networks (TSN) [2] and Deterministic Networks [3] were developed for such applications to guarantee ultra low latency, bounded latency and jitter, and zero congestion loss. The objective of this work is to develop a methodology to guarantee bounded End-to-End (E2E) latency and jitter in large-scale networks.

Voraussetzungen

C++, Expeience with OMNET++, KNowledge of TSN.

Betreuer:

Yash Deshpande, Philip Diederich - Dr Siyu Tang (Huawei Technologies)

Tow ards TSN and 5GS Integration: Implementation of TSN AF

Stichworte:
5G, TSN, Industrial Networks
Kurzbeschreibung:
Implementing a TSN AF to a 5G core to make the data plane communication deterministic.

Beschreibung

Time-Sensitive Networking (TSN)is a set of standards[1]developedby IEEE 802.1 Task Groupto enableEthernet networks to giveQuality of Service (QoS)guarantees for time-sensitiveor mission-critical traffic and applications.VariousTSN standards provide differing QoSguaranteesand require different functions to be implemented in hardware. As devices
frommultiplevendorsneedtooffermutuallycompatiblefunctions,profilessuchas IEEE60802forIndustrialAutomation[2]arebeingdefined.These profilesfocusona commonset of functions and configurations in order to decreasethe complexity which possible variations in standards might create.

Voraussetzungen

REST API, Knowledge and Experience with 5G systems, Undesrstanding of TSN.

Python.

Betreuer:

Yash Deshpande - Dr. Andreas Zirkler (Siemens AG)

Mobility Management for Computation-Intensive Tasks in Cellular Networks with SD-RAN

Beschreibung

In the previous generations of cellular networks, both data plane and control plane operations were conducted jointly in Radio Access Networks (RANs). With the emergence of Software Defined Networks (SDNs), and their adaptation in RANs, known as SD-RAN, for the first time the separation of control from data plane operations became possible in 5G RAN, as a paradigm shift on how the assignment of network resources is handled in particular, and how cellular networks operate in general. The control is shifted to centralized units, which are known as SD-RAN controllers. This brings considerable benefits into the cellular network because it detaches the monolithic RAN control and enables co-operation among different RAN components, i.e., Base Stations (BSs), improving this way network performance along multiple dimensions. Depending on the current spread of users (UEs) across BSs, and their channel conditions for which UEs periodically update their serving BSs, and BSs forward that information to the SD-RAN controller, the latter can reallocate resources to BSs accordingly. BSs then perform the resource allocation across their corresponding UEs. Consequently, exploiting the wide network knowledge leads to an overall improved performance as it allows for optimal allocation decisions.

 

This increased level of flexibility, which arises from having a broader view of the network, can be exploited in improving the mobility management in cellular networks. This comes into play even more with 6G networks in which in-network computing is envisioned to be integral part. Namely, users will be sending computationally-intensive tasks to edge clouds (through their BSs) and would be waiting some results as a response. However, as it will take some time until these tasks are run on the cloud, the user might be changing the serving BS. As a result, handover will have to be managed. However, while the task is being uploaded, performing handovers would not be good as then the task would need to be sent to another edge cloud. Consequently, having a centralized knowledge of all the network (which the SD-RAN controller has), to avoid frequent handovers, the controller has an extra degree of freedom by increasing the number of frequency blocks that can be assigned to a user while uploading the task and while downloading results.

 

In this thesis the goal would be to increase the overall network utility by deciding which tasks to serve (each task has its own utility), given the limited network resources in terms of the upload bandwidth, download bandwidth, storage in edge clouds, and finite computational capacity. Users besides sending tasks and receiving results are assumed to run other applications, with given service requirements. The student will formulate optimization problems and solve them either analytically or using an optimization solver, like Gurobi, CVX, etc. The other task would be to conductt realistic simulations and showing the advantages the developed algorithms offer against benchmarks.

 

 

 

 

 

 

Voraussetzungen

Good knowledge of Python and interest to learn about mobility management in 5G

Betreuer:

Anna Prado, Fidan Mehmeti

Enhanced Mobility Management in 5G Networks with SD-RAN

Beschreibung

 

In pre-5G networks, both the data plane and control plane operations were performed jointly in Radio Access Networks (RANs). With the emergence of Software Defined Networks (SDNs), and its adaptation in RANs, known as SD-RAN, for the first time the separation of control from data plane became possible 5G RAN, as a paradigm shift on how the assignment of network resources is handled in particular, and how cellular networks operate in general. The control is transferred to centralized units, which are known as SD-RAN controllers. This brings considerable benefits into the mobile network since it detaches the monolithic RAN control and enables co-operation among different RAN components, i.e., Base Stations (BSs), improving the network performance along several dimensions. To that end, depending on the current spread of the users (UEs) across BSs, and their channel conditions for which the UEs periodically update their serving BSs, and BSs send that information to the SD-RAN controller, the latter can reallocate resources to BSs accordingly. BSs then perform the resource allocation across their corresponding UEs. As a consequence, exploiting the wide network knowledge leads to an overall improved performance as it allows for optimal allocation decisions.

 

This increased level of flexibility, which arises from having a broader view of the network, can be exploited in improving the mobility management in cellular networks. In the previous generations of cellular networks, each BS has its own set of frequencies at which it could transmit. Given that each user would receive service by only one BS, depending on the channel conditions the users would have with the serving BS and the number of users within the same sell, the user would decide on whether she would need a handover or it would be better to remain within the same serving area (i.e., receiving service from the same BS) . Currently, conditional handovers are being the most serious candidate for 5G. However, every handover involves a considerable cost, due to the preparations that need to be performed to hand a user over from one BS to another one. These will unavoidably lead to reductions in data rates and network resources for other users. On the other hand, having a centralized knowledge of all the network (which the SD-RAN controller has), to avoid frequent handovers, the controller has an extra degree of freedom by increasing the number of frequency blocks that can be assigned to a user experiencing bad channel conditions. This of course depends on the topology of the users in that moment.

 

In this thesis, the focus will be on jointly deciding on the resource allocation policy for each user across the entire area of the controller and when to perform the handover in order to optimize different performance aspects (e.g., provide proportional fairness). To that end, the student will formulate optimization problems and solve them either analytically or using an optimization solver, like Gurobi, CVX, etc. The other part would be conducting realistic simulations and showing the advantages the developed algorithms offer against state of the art.

 

 

Voraussetzungen

Good knowledge of Python and interest to learn about mobility management in 5G

Betreuer:

Anna Prado, Fidan Mehmeti

Network Intrusion Detection using pre-trained tabular representation models

Stichworte:
Machine learning, intrusion detection
Kurzbeschreibung:
Detecting intrusion detection using tabular representation and pre-trained machine learning models.

Beschreibung

Network Intrusion Detection (NID) is a common topic in cybersecurity. However, it is not trivial to find a solution when facing the complicated network environment nowadays. Often a complex system is needed to process enormous volume of data stored in databases. This thesis proposes to use Deep Learning models to tackle the NID problem in a pre-train/fine-tune manner. As the new paradigm of transfer learning, the process of pre-training follows by fine-tuning has achieved huge success in many areas such as vision and NLP. We aim to study whether those trending models still perform well on large-scale structured data such as network security logs. It is plausible to leverage the strong learning ability of DL models to learn table representations and separate anomaly from benign records based on the learned information.

Voraussetzungen

  • Machine learning knowdlege
  • Programming skills (Python, GIT)
  • Computer networking knowledge

Betreuer:

Cristian Bermudez Serna, Hasan Yagiz Özkan - Dr. Haojin Yang (HPI)

Automated Generation of Adversarial Inputs for Data Center Networks

Stichworte:
adversarial; datacenter networks

Beschreibung

Today's Data Center (DC) networks are facing increasing demands and a plethora of requirements. Factors for this are the rise of Cloud Computing, Virtualization and emerging high data rate applications such as distributed Machine Learning frameworks.
Many proposal for network designs and routing algorithms covering different operational goals and requirements have been proposed.
This variety makes it hard for operators to choose the ``right'' solution.
Recently, some works proposed that automatically generate adversarial input to networks or networking algorithms [1,2] to identify weak spots in order to get a better view of their performance and help operators' decision making. However, they focus on specific scenarios.
The goal of this thesis is to develop or extend such mechanisms so that they can be applied a wider range of scenarios than previously.
The thesis builds upon an existing flow-level simulator in C++ and initial algorithms that generate adversarial inputs for networking problems.

[1] S. Lettner and A. Blenk, “Adversarial Network Algorithm Benchmarking,” in Proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies, Orlando FL USA, Dec. 2019, pp. 31–33, doi: 10.1145/3360468.3366779.
[2] J. Zerwas et al., “NetBOA: Self-Driving Network Benchmarking,” in Proceedings of the 2019 Workshop on Network Meets AI & ML  - NetAI’19, Beijing, China, 2019, pp. 8–14, doi: 10.1145/3341216.3342207.

Voraussetzungen

- Profound knowledge in C++

Betreuer:

Towards Log Data-driven Fault Analysis in a Heterogeneous Content Provider Network

Beschreibung

Bayerischer Rundfunk (BR) operates a network to deliver content via television, radio and the internet to its users. This requires a highly heterogenous network. The network monitoring solution for the BR-network collects log data from involved devices and stores it in a central database. Currently, human operators make network management decisions based on a manual review of this log data. This especially includes root cause identification in case of network failures. Such a human-centric process can be tedious and does not scale well with increasing network complexity. In this thesis, the student should perform a thourough analysis of the described data and evaluate the potential for automated processing. Goal is to provide a data-driven approach that significantly supports human operators with identifying root causes in case of network failures.

Betreuer:

Maximilian Stephan

Reliability Analysis of ONOS Releases based onCode Metrics and SRGM

Beschreibung

Software Defined Networking (SDN) separates the control and data planes.Control plane can be considered as the brain of the network and it is responsible for configuring flows, finding paths and managing all the network functionalities like firewall,  load balancing,  etc.  For this reason,  the SDN controller became complex.  Furthermore, it is a large software platform, which have many contributors  with  different  experience  level.   As  a  result  the  code  contains  many undetected and unresolved bugs.  If one of these bugs is activated in the operational state, it may cause performance degradation or even collapse of the whole system.

SDN serves to broad range of applications with different requirements.  Some of the application areas like autonomous driving requires high reliability and performance degradation may cause undesired results.  Software Reliability Growth Models (SRGM) are statistical frameworks that are based on historical bug reports  for  reliability  analysis  and  widely  used  to  estimate  the  reliability  of  a software.  Open network operating system (ONOS) is an open source project and it became one of the most popular SDN platforms.  Its historical bug reports are open in their JIRA issue tracker.  Currently ONOS has 23 releases, its first ten  versions  are  investigated  with  different  SRGM  models  [1]  and  found  that different SRGMs fit to the bug detection of different versions of ONOS.

Source code metrics refer to quantitative characteristics of the code.  Those metrics  can  describe  the  size  of  the  code  (lines  of  code),  complexity  of  code (McCabe’s complexity), etc.  They have been used to predicting the number of bugs, identifying possible potential location of bug, etc.

The goal of this work is to analyse the reliability of different ONOS releases. For that purpose, an understanding of the correlation between the structure of source code and the bug manifestation process is crucial to predict the future bug manifestation of the new releases.  First, a state of the art research on the SRGM will  be  done  to  understand  the  software  reliability  and  SRGMs.   Afterwards the  student  should  implement  different  SRGMs  to  fit  the  error  manifestation of  every  release  and  compare  the  results  with  mentioned  research  [1].   Then, different  code  metrics  will  be  obtained  from  each  ONOS  release.   Then,  the correlation between SRGM and code metrics will be revealed.  At last reliability of the release will be analyzed with the best fitting SRGM. The result of this work will be to propose a reliability metric combining SRGM and code metrics that improves the software reliability prediction.

 

References

P. Vizarreta, K. Trivedi, B. Helvik, P. Heegaard, W. Kellerer, and C. Mas Machuca, An empirical study of software reliability in SDN controllers,  13th International  Conference  on  Network  and  Service  Management  (CNSM), 2017.

Betreuer:

Hasan Yagiz Özkan

Reinforcement Learning for joint/dynamic user and slice scheduling in RAN towards 5G

Beschreibung

In the Radio Access Network (RAN), the MAC scheduler is largely inherited across generations in the past, to fit to new networking goals and service requirements. The rapid deployment of new 5G technologies will make upgrading of current ones extremely complicated and difficult to improve and maintain. Therefore, finding new solutions for efficient Radio Resource Scheduling (RRS) is necessary to meet the new KPI targets. 5G networks and beyond use the concept of network slicing by forging virtual instances (slices) of its physical infrastructure. A heterogeneous network requires a more optimized and dynamic RRS approach. In view of the development of SD-RAN controllers and artificial intelligence, new promising tools such as reinforcement learning can be proven useful for such a problem.

In this thesis, a data-driven MAC slice scheduler will be implemented, that maximizes user utility, while learning the optimal slice partitioning ratio. A deep reinforcement learning technique will be used to evaluate the radio resource scheduling and slicing in RAN. The results will be compared with traditional schedulers from the state-of-the-art.

Betreuer:

Arled Papa - Prof. Navid Nikaein (EURECOM)

vnf2tx: Automating VNF platform operation with Reinforcement Learning

Beschreibung

...

Betreuer:

Hierarchical SDN control for Multi-domain TSN Industrial Networks

Beschreibung

In this thesis student will focus on designing and implementing a hierarchical SDN solution for industrial multi-domain TSN network.

Kontakt

kostas.katsalis@huawei.com

Betreuer:

Nemanja Deric - Dr. Kostas Katsalis (Huawei Technologies)

Deliberate Load-Imbalancing in Data Center Networks

Stichworte:
Traffic Engineering, Scheduling, Data Center Networks
Kurzbeschreibung:
Goal of this thesis is the implementation and evaluation of an in-dataplane flow scheduling algorithm based on the online scheduling algorithm IMBAL in NS3.

Beschreibung

Recently, a scalable load balancing algorithm in the dataplane has been proposed that leverages P4 to estimate the utilization in the network and assign flows to the least utilized path. This approach can be interpreted as a form of Graham's List algorithm.

In this thesis, the student is tasked to investigate how a different online scheduling algorithm called IMBAL performs compared to HULA. A prototype of IMBAL should be implemented in NS3. The tasks of this thesis are:

  1. Literature research and overview to online scheduling and traffic engineering in data center networks.
  2. Design how IMBAL can be implemented in NS3.
  3. Implementation of IMBAL in NS3.
  4. Evaluation of the implementation in NS3 with production traffic traces and comparison to HULA (a HULA implementation is provided from the chair and its implementation not part of this thesis).

Betreuer:

5G-RAN control plane modeling and Core network evaluation

Beschreibung

Next generation mobile networks are envisioned to cope with heterogeneous applications with diverse requirements. To this end, 5G is paving the way towards more scalable and higher performing deployments. This leads to a revised architecture, where the majority of the functionalities are implemented as network functions, which could be scaled up/down depending on the application requirements. 

3GPP has already released the 5G architecture overview, however there exists no actual open source deployment of RAN functionalities. This will be crucial towards the evaluation of the Core network both in terms of scalability and performance. In this thesis, the student shall understand the 5G standardization, especially the control plane communication between the RAN and 5G Core. Further, an initial RAN function compatible with the 5G standards shall be implemented and evaluation of control plane performance will be carried out. 

Voraussetzungen

  • Strong knowledge on programming languages Python, C++ or Java.
  • Knowledge about mobile networking is necessary.
  • Knowlegde about 4G/5G architecture is a plus.

Betreuer:

Endri Goshi, Arled Papa

Interdisziplinäre Projekte

Joint radio and computing resource allocation using artificial intelligence algorithms

Beschreibung

Mobile Edge Computing (MEC) enabled 6G network support low latency applications running in energy-constrained and computational limited devices, especially IoT devices. Using the task offloading concept, the devices offload the incoming tasks fully or partially to MEC depending on the device and network side's communication and computation resource availability.

The 6G networks are oriented towards the Digital Twins (DT); therefore, the resource allocation and offloading decisions are enhanced with the context-awareness of the devices, environment, and network. The device context awareness consists of battery state, power consumption, CPU load, and traffic type. Further, the environmental context-awareness includes the position of the network components, the mobility patterns, and the quality of the wireless channel and the availability of the network resources.

 

In this project, the student will focus on developing and testing an artificial intelligence algorithm for joint allocating of computing and radio resources in a predictive manner, focusing on decreasing individual devices' energy consumption and reducing processing latency.

Tasks

 

  • Work with a 6G radio access network simulator, to generate the database for the scenario with devices having high energy efficiency and low task processing latency requirements.
  • Develop a reinforcement learning algorithm for joint allocation of radio and computing resource allocation.
  • Comparing the developed model with the state-of-the-art approaches.
  • Test and documentation.

 

Voraussetzungen

 

  • Good knowledge of Python programming.
  • Good mathematical background.
  • Good knowledge of deep learning/reinforcement learning.

Betreuer:

Alba Jano

Forschungspraxis (Research Internships)

Topology Upgrade for Optimal and Reliable Multi-Period Network Planning

Beschreibung

Optical networks are crucial for digital communications, handling massive data transport over long distances with wavelength division multiplexing (WDM) in the C-band. However, growing traffic demands may surpass conventional WDM capacities, prompting the exploration of ultra-wideband (UWB) and spatial division multiplexing (SDM) solutions. SDM increases throughput by utilizing different spatial domains, while UWB increases the available spectrum by taking advantage of transmission over multiple bands. Despite hesitancy due to cost, network operators recognize the need for optimal topology upgrades to meet evolving traffic demands, especially when reliability is taken into account. On top of the SDM and UWB upgrades on the existing topology, this also includes installing new links that do not exist in the original topology.

In this thesis, the goal is to optimally add links to existing core network topologies using the aforementioned schemes (SDM and UWB), according to increasing traffic demands, towards minimum cost, and considering reliability constraints, such as dedicated 1+1 protection for the demands.

Voraussetzungen

  • Basic knowledge of optical networks and network reliability.
  • Experience in Python.
  • Experience with formulating and solving Integer Linear Programming (ILP) problems.

Kontakt

maria.samonaki@tum.de

Betreuer:

Maria Samonaki

Implementation of a Medical Communication Library in C++

Beschreibung

Implementation of a Medical Communication Library in C++ to improve the performance.

Betreuer:

Nicolai Kröger

Improving the Medical Communication Protocol for the Room Sensitive Measurement of Vital Parameters

Beschreibung

In this FP, our existing communication protocol in the medical context is extended.

Betreuer:

Nicolai Kröger - Franziska Jurosch (MITI)

Evaluation of Time Synchronization in NR UE-UE Interference Scenarios

Kurzbeschreibung:
Evaluate UE-UE interference in case of time offset in 5G

Beschreibung

This research internship aims to assess the impact of time synchronization discrepancies between base stations located in different cells. When time offsets occur, transmissions from one cell may reach user equipment (UEs) in neighboring cells at unintended times, resulting in interference and potential performance degradation.

This research internship will set up a MATLAB simulation to evaluate this scenario.

Voraussetzungen

  1. Understanding of 5G systems.
  2. Design of Experiments.
  3. Experience with MATLAB.

Betreuer:

Yash Deshpande

Performance Evaluation of Serverless Frameworks

Stichworte:
Serverless, Function as a Service, Machine Learning, Distributed ML

Beschreibung

Serverless computing is a cloud computing paradigm that separates infrastructure management from software development and deployment. It offers advantages such as low development overhead, fine-grained unmanaged autoscaling, and reduced customer billing. From the cloud provider's perspective, serverless reduces operational costs through multi-tenant resource multiplexing and infrastructure heterogeneity.

 

    However, the serverless paradigm also comes with its challenges. First, a systematic methodology is needed to assess the performance of heterogeneous open-source serverless solutions. To our knowledge, existing surveys need a thorough comparison between these frameworks. Second, there are inherent challenges associated with the serverless architecture, specifically due to its short-lived and stateless nature.

Betreuer:

Navidreza Asadi

Adapting reinforcement learning to the characteristics of quantum key distribution networks

Stichworte:
Quantum key distribution, reinforcement learning

Beschreibung

The research internship aims to implement a reinforcement learning (RL) algorithm using Python to optimize routing agents in QKD networks. The literature showed different proof of concepts from other applications, and the research internship's objective is to adapt the best-suited one to the characteristics of QKD. 

Voraussetzungen

- Background in AI/ML

- Experienced in Python

- Experienced in Statistics

Kontakt

Mario Wenning

mario.wenning@tum.de

Betreuer:

Mario Wenning

Improving network availability- a min cut set approach

Stichworte:
availability, reliability, Minimal

Beschreibung

A cut set is a set of components that, by failing, causes the system to fail. A cut set is minimal if it cannot be reduced without losing its status as a cut set.

In this work, we aim to improve network availability based on the mincutsets. 

Voraussetzungen

Communication Network Reliability course, Python, and Integer Linear Programming will be useful.

Kontakt

shakthivelu.janardhanan@tum.de

Betreuer:

Shakthivelu Janardhanan

Investigating SDR-Based OpenRAN with LiFi Technology

Beschreibung

This internship offers a comprehensive exploration of cutting-edge telecommunications technologies, focusing on the integration of Software-Defined Radios (SDRs) with Light Fidelity (LiFi) technology within the OpenRAN architecture.

Betreuer:

Hansini Vijayaraghavan - Muhammad Asad (aeroLiFi GmbH)

Evaluating MPTCP in a LiFi-WiFi Network

Stichworte:
Multipath communication, LiFi, Hardware

Beschreibung

Tasks:

  • Review of related literature on multipath protocols
  • MPTCP+LiFi enabled hardware setup 
  • Evaluate and Compare different schedulers on linux testbed

 

If you are interested in this work, please send an email with a short introduction of yourself along with your CV and grade transcript.

Voraussetzungen

  • Experience with Linux networking
  • Strong foundation in wireless networking concepts
  • Availability to work in-presence

Betreuer:

Evaluation of Time Synchronization in NR BS-BS Interference Scenarios

Kurzbeschreibung:
To evaluate time offset in agressor victim simulations in 5G NR

Beschreibung

The research will utilize the 5G-NR functions available in Matlab for a two-base station scenario, each having multiple UEs connected in both cells. The throughput and block error rate of a UE at the edge of the cell will be evaluated for multiple simulations for different values of delayed transmission in the interfering base station. The study will also incorporate the other BS parameters, such as BS transmit power and the distance between the two BSs, and analyze their influence on the results obtained.

Betreuer:

Yash Deshpande

Evaluating a Reliability Block Diagram (RBD)

Stichworte:
Reliability block diagram, availability

Beschreibung

A reliability block diagram is a tool used to measure the availability of a system (a network, in our case). However, the existing tools as software packages do not work with bidirectional links. 

This work aims to build a tool that can evaluate the availability of a network based on the RBD.

Voraussetzungen

Python and data structures, Kommunikationsnetze or Communication Network Reliability course would be useful. 

Kontakt

shakthivelu.janardhanan@tum.de

Betreuer:

Shakthivelu Janardhanan

Sovereignty of an optical switch

Stichworte:
sovereignty, availability, optical switch

Beschreibung

An optical switch has multiple subcomponents. Usually, a switch manufacturer purchases raw materials from different subcomponent manufacturers. 
When a network operator purchases switches from different switch manufacturers, there is a possibility that switches from different manufacturers share a common subcomponent. This becomes a vulnerable single point of failure. For example, in the case of laptops, an HP laptop and a Dell laptop can have the same AMD processor.

Our work is related to the trustworthiness of the subcomponent manufacturers. The goal is to evaluate:

a) The trustworthiness of a switch based on the subcomponent manufacturers

b) Provide guidelines to network operators to choose the most sovereign set of switches possible to avoid a single point of failure.

Voraussetzungen

Python

Kontakt

shakthivelu.janardhanan@tum.de

Betreuer:

Shakthivelu Janardhanan

Implementation of a Medical Communication Protocol

Beschreibung

The next generation of communication networks, namely 6G, will enable a huge variety of medical applications. In the current phase, our research focuses on optimizing the interaction between network and medical application developing. For this, we joined forces with the Minimally Invasive Interdisciplinary Therapeutical Intervention (MITI) group, sitting at the hospital "Rechts der Isar".

This research internship focuses on one certain use case, the mobile patient monitoring of patiens in the operation room. In particular, the vital parameters of the patient are continously measured and sent to a server. The task of the research internship is to develop and implement the communication protocol between the sensors and the processing server. Hereby, a basic implementation is already given. However, key components are still missing, which should be implemented and evaluated within the scope of this research internship.

 

Please note, that the real setup is located at MITI. You may have to work there.

Voraussetzungen

  • Motivation
  • Knowledge about Python and Linux
  • Basic communication (protocol) principles

Betreuer:

Nicolai Kröger - Franziska Jurosch (MITI)

A Study on Learning-Based Horizontal Autoscaling on Kubernetes

Stichworte:
Autoscaling, Kubernetes, Edge Computing

Beschreibung

 The rapid growth of edge computing has introduced new challenges in managing and scaling workloads in distributed environments to maintain stable service performance while saving resources. To address this, this research internship aims to explore the feasibility and implications of extending the AWARE framework (Qiu et al., 2023) [1], which has been developed by as an automated workload autoscaling solution for production cloud systems, to edge environments. 

 

 AWARE utilizes tools such as reinforcement learning, meta-learning, and bootstrapping when scaling out workloads in the horizontal dimension by increasing the number of deployment instances and scaling up in the vertical dimension by increasing the allocated resources of a deployment instance. We will employ edge environment infrastructures with limited resources that run a lightweight distribution of the Kubernetes (K8s) container orchestration tool, and the goal is to gain insights into the performance, adaptability, and limitations of this approach.

Betreuer:

Navidreza Asadi

Development and Evaluation of an Intelligent Wireless Resource Management for 5G/6G Downlink Channel

Beschreibung

In this work, we will evaluate several additional techniques in 5G/6G toward reliability enhancements focusing on the Radio Access Network (RAN). The student is expected to first understand and evaluate the concept via simulations over MATLAB. Then, the techniques will be implemented in OpenAirInterface (OAI) [1] platform and we will evaluate the enhancements over our practical 5G testbed setup.

The initial setup will include a mobile robot, 5G Stand-alone communication, and a multi-access edge computing (MEC) system running a machine learning algorithm.

The expected outcome is to have improvements to the RAN of OAI including but not limited to wireless channel estimation and equalization, downlink reliability. More details will be provided after the first meeting.

[1] N.Nikaein, M.K. Marina, S. Manickam, A.Dawson, R. Knopp and C.Bonnet,
“OpenAirInterface: A flexible platform for 5G research,” ACM SIGCOMM Computer
Communication Review, vol. 44, no. 5, 2014.

Voraussetzungen

- Good C/C++ experience

- Good Matlab knowledge

 - Medium knowledge on OFDM and Wireless Channel Estimation

- Good Python knowledge is a plus

- Machine Learning understanding is a plus

Kontakt

serkut.ayvasik@tum.de

Betreuer:

ILP-based network planning for the future railway communications

Stichworte:
Network Planning, On-Train Data Communications. Integer Linear Programming
Kurzbeschreibung:
Exploration of mechanisms for handling data communications under the influence of mobility in the German long distance railway system.

Beschreibung

This work focuses on the exploration of networks enabling train control and on-board data communications under mobility scenarios. Today, low bandwidth networks such as GSM, providing less than 200 Kbps are being used to transmit train control information. Moreover, despite trains may use multiple on-board technologies to provide users with an internet connection (e.g., repeaters, access points), they fail in their attempt as these connections are characterized by having low throughput (less than 2 Mbps) and frequent service interruptions.

This work aims at the development of a network planning solution enabling future applications in train mobility scenarios such as: Automatic Train Operation (ATO) [1,2], leveraging cloud technologies and meeting bandwidth requirements of data-hungry end-users' applications. Here, special attention will be given to the migration of communications services triggered by trains mobility patterns. It is expected of the student to find solutions to the following questions:

  • When to trigger service migrations?

  • Where to migrate services? (i.e., to which data center)

  • How to handle this process? (So that the user does not perceive any interruption)

 Given:

  • Trains mobility patterns

  • Service requirements in terms of bandwidth and delay

  • Network topology

  • Data center locations

 
The results from this work can be useful to get an insight on requirements for Smart Transportation Systems, that may in turn be useful for cementing the basis of other scenarios such as: Autonomous Driving and Tele-Operated Driving.

 [1] Digitale Schiene Deutschland. Last visit on 13.12.2021 https://digitale-schiene-deutschland.de/FRMCS-5G-Datenkommunikation

[2] 5G-Rail FRMCS. Last visit on 13.12.2021 https://5grail.eu/frmcs/

Voraussetzungen

Basic knowledge in:

  • Integer Linear Programming (ILP), heuristics or Machine Learning (ML).

  • Python

Please send your CV and transcript of records.

 

Kontakt

Betreuer:

Cristian Bermudez Serna

Machine-learning-based network planning for the future railway communications

Stichworte:
Network Planning, On-Train Data Communications. Machine Learning
Kurzbeschreibung:
Exploration of mechanisms for handling data communications under the influence of mobility in the German long distance railway system.

Beschreibung

This work focuses on the exploration of networks enabling train control and on-board data communications under mobility scenarios. Today, low bandwidth networks such as GSM, providing less than 200 Kbps are being used to transmit train control information. Moreover, despite trains may use multiple on-board technologies to provide users with an internet connection (e.g., repeaters, access points), they fail in their attempt as these connections are characterized by having low throughput (less than 2 Mbps) and frequent service interruptions.

This work aims at the development of a network planning solution enabling future applications in train mobility scenarios such as: Automatic Train Operation (ATO) [1,2], leveraging cloud technologies and meeting bandwidth requirements of data-hungry end-users' applications. Here, special attention will be given to the migration of communications services triggered by trains mobility patterns. It is expected of the student to find solutions to the following questions:

  • When to trigger service migrations?

  • Where to migrate services? (i.e., to which data center)

  • How to handle this process? (So that the user does not perceive any interruption)

 Given:

  • Trains mobility patterns

  • Service requirements in terms of bandwidth and delay

  • Network topology

  • Data center locations

 
The results from this work can be useful to get an insight on requirements for Smart Transportation Systems, that may in turn be useful for cementing the basis of other scenarios such as: Autonomous Driving and Tele-Operated Driving.

 [1] Digitale Schiene Deutschland. Last visit on 13.12.2021 https://digitale-schiene-deutschland.de/FRMCS-5G-Datenkommunikation

[2] 5G-Rail FRMCS. Last visit on 13.12.2021 https://5grail.eu/frmcs/

Voraussetzungen

Basic knowledge in:

  • Integer Linear Programming (ILP), heuristics or Machine Learning (ML).

  • Python

Please send your CV and transcript of records.

 

Kontakt

Betreuer:

Cristian Bermudez Serna

Evaluation of traffic model impact on a context-aware power consumption model of user equipment

Stichworte:
5G, IIoT, energy, efficiency

Beschreibung

Energy efficiency is one of the key performance requirements in the 5G network to ensure user experience. A portion of devices, especially the Industrial Internet of Things (IIoT), run on limited energy, supported by the batteries not placed over the lifetime.

Therefore, the estimation of the power consumption and battery lifetime has recently received increased attention. Multiple context parameters, such as mobility and traffic arrivals, impact the device's power consumption.

In this thesis, the student shall focus on analysing the impact of different traffic models on the power consumption of user equipment. Different source and aggregated traffic models will be implemented depending on the number of devices n the scenario. The implemented traffic models will be evaluated based on a context-aware power consumption model for the user equipment.

Voraussetzungen

  • Good knowledge of Python and Matlab programming.
  • Good mathematical background.
  • Knowledge mobile networks.

Betreuer:

Alba Jano

Cost evaluation of a dynamic functional split

Beschreibung

Increased interference is one of the main drawbacks of cell densification, which is an important strategy for 5G networks to achieve higher data rates. Function centralization has been proposed as a strategy to counter this problem, by letting the physical or scheduling functions coordinate among one another. Nevertheless, the capacity of the fronthaul network limits the feasibility of this strategy, as the throughput required to connect low level functions is very high. Fortunately, since not every function benefits in the same way from centralization, a more flexible approach can be used. Instead of centralizing all functions, only those providing the highest amount of interference mitigation can be centralized. In addition, the centralization level, or functional split, can be change during runtime according to the instantaneous network conditions. Nonetheless, it is not fully know how costly it is to deploy and operate a network implementing a dynamic functional split.

In this internship, the cost of a radio access network implementing a dynamic functional split will be evaluated. A simulator already developed at LKN will be used and extended to produce network configurations adapted to the instantaneous user position and activity. Then, off-the-shelf cost models will be improved and used to estimate the deployment and operating cost of the network under multiple scenarios. Furthermore, the conditions on which a dynamic functional split is profitable will be investigated. Improvements on the functional-split selection algorithm will be proposed, such that the operator benefits from enhanced performance without operating at exceedingly costly states. Finally, a model that takes into account the cost of finding and implementing a new functional split will be employed and its results compared to the previous results.

Betreuer:

Jitter Analysis and Comparison of Jitter Algorithms

Beschreibung

In electronics and telecommunication, jitter is a significant and an undesired factor. The effect of jitter on the signal depends on the nature of the jitter. It is important to sample jitter and noise sources when the clock frequency is especially prone to jitter or when one is debugging failure sources in the transmission of high speed serial signals. Managing jitter is of utmost importance and the methods of jitter decomposition have changed comparably over the past years.

 

In a system, jitter has many contributions and it is not an easy job to identify the contributors. It is difficult to get Random Jitter on a spectrogram. The waveforms are initially constant, but the 1/f noise and flicker noise cause a lot of disturbance when it comes to output measurement at particular frequencies in a system. 

 

The task is to understand the difference between the jitter calculations based on a step response estimation and the dual dirac model by comparing the jitter algorithms between the R&S oscilloscope and other competition oscilloscopes. Also to understand how well the jitter decomposition and identification is there.

 

The tasks in detail are as follows.

Setup a waveform simulation environment and extend to elaborate test cases

Run the generated waveforms through the algorithms

Analyze and compare the results:

Frequency domain

Statistically (histogram, etc)

Time domain

Consistency of the results

Evaluate the estimation of the BER (bit error rate)

Identify the limitations of the dual-dirac model

Compare dual-dirac model results with a calculation based on the step response estimation

Generate new waveforms based on the analysis

Summarize findings

Betreuer:

Arled Papa - Mathias Hellwig (Rohde Schwarz)

Probabilistic Traffic Classification

Stichworte:
Probabilistic Graphical Models, Markov Model, Hidden Markov Model, Machine Learning, Traffic Classification
Kurzbeschreibung:
Classification of packet level traces using Markov and Hidden Markov Models.

Beschreibung

The goal of this thesis is the classification of packet-level traces using Markov- and Hidden Markov Model. The scenario is open-world: Traffic of specific web applications should be distinguished from all possible web-pages (background traffic). In addition, several pages should be differentiated. Examples include: Google Maps, Youtube, Google Search, Facebook, Google Drive, Instagram, Amazon Store, Amazon Prime Video, etc.

Betreuer:

Ingenieurpraxis

Praktikantin Planung, Steuerungstechnik und produktionsnahe IT

Beschreibung

...

Betreuer:

Data Analysis and Prediction of Optical Network Performance on Open Source Data

Beschreibung

The Internship aims to analyze Open Source Optical Network Data for performance prediction of Optical Networks and develop data-driven methods for quality of transmission estimation.

Kontakt

jasper.mueller@adtran.com

Betreuer:

Jasper Konstantin Müller - Jasper Müller (Adtran Networks SE)

Probability parameters of 5G RANs featuring dynamic functional split

Beschreibung

The architecture of 5G radio access networks features the division of the base station (gNodeB) into a centralized unit (CU) and a distributed unit (DU). This division enables cost reduction and better user experience via enhanced interference mitigation. Recent research proposes the posibility to modify this functional split dynamically, that is, to lively change the functions that run on the CU and DU. This has interesting implications at the network operation.

In this topic, the student will employ a dedicated simulator developed by LKN to characterize the duration and transition rates of each functional split under multiple variables: population density, mitigation capabilities, mobility, etc. This characterization may be used then on traffic models to predict the network behavior.

Voraussetzungen

MATLAB, some experience with mobile networks and simulators

Betreuer:

Studentische Hilfskräfte

Working Student for Implementing and Maintaining a 5G Roaming Testbed

Stichworte:
5G, Roaming, Core Network, Network Functions

Beschreibung

5G is the newest generation of mobile networks allowing for higher data-rates, lower latency and many new features like network slicing. Its central element is the 5G Core, which is a network of specialised Network Functions (NFs). Roaming allows subscribers to connect to the internet via other network operator’s networks if they have a roaming agreement. We are looking for a student to help implement and maintain a 5G Roaming testbed. At first, that is planned as an open source testbed leveraging Open5GS. Later, the plan is to connect this open source testbed to the LKN campus network.

This working student position may run parallel to Master Theses with more focused implementation and evaluation works. The working student is welcome to follow up on this work with his/ her own research internship or Master’s thesis.

Objectives

The primary objective of this work is to help implement and maintain a 5G Roaming testbed. This testbed shall then be used for investigation of security mechansims and performance measurements. Those are not the main job of the student, but the student is supposed to help.

1. Work into 5G Roaming

2. Implement missing Roaming functionalities into Open5GS

3. Maintain Roaming Testbed

4. Connect open source 5G Roaming testbed with Campus Network (once possible)

5. Aid in security investigations

6. Aid in performance measurements

7. Potentially add other NFs later

Voraussetzungen

• Motivation and team spirit

• Basic understanding of 5G networks advantageous; especially of the 5G core network

    – interest and motivation to learn the system are sufficient

• Programming knowledge in C useful (for Open5GS)

• Interest in Roaming functionalities

• Interest in security

Kontakt

Oliver Zeidler (oliver.zeidler@tum.de)

Julian Sturm (julian.sturm@tum.de)

Betreuer:

Oliver Zeidler

Working Student for the Medical Testbed

Beschreibung

Future medical applications put stringent requirements on the underlying communication networks in terms of highest availability, maximal throughput, minimal latency, etc. Thus, in the context of the 6G-life project, new networking concepts and solutions are being developed.

For the research of using 6G for medical applications, the communication and the medical side have joined forces: While researchers from the MITI group (Minimally invasive Interdisciplinary Therapeutical Intervention), located at the hospital "Rechts der Isar", focus on the requirements of the medical applications and collecting needed parameters of patients, it is the task of the researchers at LKN to optimize the network in order to satisfy the applications' demands. The goal of this joint research work is to have working testbeds for two medical testbeds located in the hospital to demonstrate the impact and benefits of future 6G networks and concepts for medical applications.

Your task during this work is to implement the communcation network for those testbeds. Based on an existing open-access 5G network implementation, you will implement changes according to the progress of the current research. The results of your work, working 6G medical testbeds, will enable researchers to validate their approaches with real-world measurements and allow to demonstrate future 6G concepts to research, industry and politics.

In this project, you will gain a deep insight into how communication networks, especially the Radio Access Network (RAN), work and how different aspects are implemented. Additionally, you will understand the current limitations and weaknesses as well as concepts for improvement. Also, you will get some insights into medical topics if interested. As in such a broad topic there are many open research questions, you additionally have the possibility to also write your thesis or complete an internship.

 

Voraussetzungen

Most important:

  • Motivation and willingness to learn unknown things.
  • Ability to work with various partners (teamwork ability).

 

Of advantage:

  • C/C++ and knowledge about how other programming languages work (Python, etc.)
  • Knowledge about communication networks (exspecially the RAN), 5G concepts, the P4 language, SDN, Linux.
  • Initiative to bring in own ideas and solutions.

Please note: It is not necessary to know about every topic aforementioned, much more it is important to be willing to read oneself in.

 

Betreuer:

Nicolai Kröger

Working Student for Analysis, Modeling and Simulation of Communication Networks SS2023

Beschreibung

The main responsibilities of a working student include assistance to tutors in the correction of the programming assignments, as well as answering the questions in Moodle.  Working time is 6-7 hours per week in the period from May to July.

Voraussetzungen

  • Python knowledge

Kontakt

polina.kutsevol@tum.de

Betreuer:

Alba Jano, Polina Kutsevol

Working Student for Testbed on 5G/6G RAN

Beschreibung

The results expected from this work are the enhancement of the 5G/6G tested setup with additional features on the Radio Access Network (RAN) and Core Network (CN). The work is focused on the OpenAirInterface (OAI) [1] platform, which forms the basis of the testbed setup. The expected outcome is to have improvements in wireless resource scheduling, focused on the uplink (UL), power management, and core network function management. 

[1] N.Nikaein, M.K. Marina, S. Manickam, A.Dawson, R. Knopp and C.Bonnet, “OpenAirInterface: A flexible platform for 5G research,” ACM SIGCOMM Computer Communication Review, vol. 44, no. 5, 2014.

Voraussetzungen

  • Good C/C++ experience
  • Good Python knowledge
  • RAN and CN architecture understanding is a plus

Kontakt

alba.jano@tum.de, yash.deshpande@tum.de

Betreuer:

Alba Jano, Yash Deshpande

Working Student for Network Delay Measurements

Beschreibung

Communication Networks must fulfill a strict set of requirements in the Industrial Area. The Networks must fulfill strict latency and bandwidth requirements to allow trouble-free operation. Typically, the industry relies on purpose build solutions that can satisfy the requirements.

Recently, the industry is moving towards using Ethernet-based Networks for their use case. This enables us to use common of the shelf hardware to communicate within the network. However, this hardware still will execute industrial applications and therefore has the same strict requirements as the network. In this project, we consider Linux-based hosts that run the industrial applications. We consider different networking hardware and configurations of the system to see how it affects performance. The goal is to investigate the overhead of the host. 

 

Your tasks within the project are :

  • Measure the Host Latency with different NICs
  • Measure the Host Latency with different Hardware Offloads
  • Tune, configure, and measure the Linux Scheduler to improve performance

 

You will gain:

  • Experience with Networking Hardware
  • Experience with Hardware Measurements 
  • Experience with Test Automation

 

Please send a short intro of yourself with your CV and transcript of records to us. We are looking forward to meeting you.

 

Voraussetzungen

  • Familiarity with Linux Console
  • Python
  • C (not required, but a plus)

Kontakt

philip.diederich@tum.de

Betreuer:

Solving the manufacturer assignment problem to maximise availability of a network using linear programming

Stichworte:
availability, manufacturer assignment, Nonlinear program

Beschreibung

Availability is the probability that a device performs its required function at a particular instant of time.

In most networks, the components are brought from different manufacturers. They have different availabilities. Network operators prefer having reliable components handling more traffic. This ensures the robustness of the network. So, assigning appropriate manufacturers to the components in the topology guaranteeing 
a) maximum availability, and 
b) load balancing on the nodes
is essential.

For a fixed topology and known traffic, how can the components be assigned to manufacturers to maximise availability and balance load on nodes?

Voraussetzungen

Mandatory:

  • Communication Network Reliability course/ Optical Networks course at LKN
  • Python

 

Preferred:

  • Knowledge of Linear Programming and/or nonlinear programming

Kontakt

shakthivelu.janardhanan@tum.de

Betreuer:

Shakthivelu Janardhanan

Working Student for the Implementation of a Medical Testbed

Stichworte:
Communication networks, programming
Kurzbeschreibung:
Your goal is to implement a network for critical medical applications based on an existing open-access 5G networking framework as well as the adaptation of this network according to the needs of our research.

Beschreibung

 

Future medical applications put stringent requirements on the underlying communication networks in terms of highest availability, maximal throughput, minimal latency, etc. Thus, in the context of the 6G-life project, new networking concepts and solutions are being developed.

For the research of using 6G for medical applications, the communication and the medical side have joined forces: While researchers from the MITI group (Minimally invasive Interdisciplinary Therapeutical Intervention), located at the hospital "Rechts der Isar", focus on the requirements of the medical applications and collecting needed parameters of patients, it is the task of the researchers at LKN to optimize the network in order to satisfy the applications' demands. The goal of this joint research work is to have working testbeds for two medical testbeds located in the hospital to demonstrate the impact and benefits of future 6G networks and concepts for medical applications.

Your task during this work is to implement the communcation network for those testbeds. Based on an existing open-access 5G network implementation, you will implement changes according to the progress of the current research. The results of your work, working 6G medical testbeds, will enable researchers to validate their approaches with real-world measurements and allow to demonstrate future 6G concepts to research, industry and politics.

In this project, you will gain a deep insight into how communication networks, especially the Radio Access Network (RAN), work and how different aspects are implemented. Additionally, you will understand the current limitations and weaknesses as well as concepts for improvement. Also, you will get some insights into medical topics if interested. As in such a broad topic there are many open research questions, you additionally have the possibility to also write your thesis or complete an internship.

Voraussetzungen

 

  • Most important: Motivation and willingness to learn unknown things.
  • C/C++ and knowledge about how other programming languages work (Python, etc.) and/or the willingness to work oneself into such languages.
  • Preferred: Knowledge about communication networks (exspecially the RAN), 5G concepts, the P4 language, SDN, Linux.
  • Initiative to bring in own ideas and solutions.
  • Ability to work with various partners (teamwork ability).

Please note: It is not necessary to know about every topic aforementioned, much more it is important to be willing to read oneself in.

Kontakt

Betreuer:

Nicolai Kröger

Demo implementation: Multi-domain redundant network routing

Stichworte:
multi-domain, SDN
Kurzbeschreibung:
This works consists on the implementation of a multi-domain SDN network.

Beschreibung

Software-Defined Networking (SDN) is a network paradigm where control and data planes are decoupled. The control plane consists on a controller, which manages network functionality and can be deployed in one or multiple servers. The data plane consists on forwarding entities which are instructed by the controller on how to forward traffic.

A network can be divided in multiple domains in order to ease its management or limit ownership. In multi-domain SDN, each domain has a controller which is responsible for the management. Controllers in different domains cooperate which each other aiming at providing multi-domain end-to-end connectivity.

In this work, the student will receive an abstract topology representing the multi-domain network. This information has to be used to build a virtual network, that can be used in the testing of different algorithms. The implementation should include a GUI, in order to visualize the topology and interact with the different elements in the network.

Please send your CV and transcript of records.

Voraussetzungen

Basic knowledge on the following:

  • Linux
  • Networking/SDN
  • Python
  • Object-Oriented Programming
  • Web programming (GUI)

Kontakt

Betreuer:

Cristian Bermudez Serna

End-to-End Delay Measurements of Linux End Hosts

Beschreibung

As preliminary results show, Linux TCP/IP Networking Stack introduces a high networking delay. The topic of this work is to perform an empirical study on the Linux socket-based transmission approach and implement a delay measurement workflow based on existing foundations and repositories.

References:

[1] Where has my time gone?

Voraussetzungen

Basic knowledge of 

  • Networking and Linux
  • C

Betreuer:

Zikai Zhou

Implementation of a Techno-Economic tool for VLC

Kurzbeschreibung:
Development and implementation in Excel/VBA of visible light communication (VLC) techno-economic tool for IoT services.

Beschreibung

Future IoT will need wireless links with high data rates, low latency and reliable connectivity despite the limited radio spectrum. Connected lighting is an interesting infrastructure for IoT services because it enables visible light communication (VLC), i.e. a wireless communication using unlicensed light spectrum. This work will aim at developing a tool to perform an economic evaluation of the proposed solution in the particular case of a smart office.

For that purpose, the following tasks will have to be performed:

  • Definition of a high-level framework specifying the different modules that will be implemented as well as the required inputs and the expected outputs of the tool.
  • Development of a cost evaluation Excel-VBA tool. This tool will allow to evaluate different variations of the selected case study and if possible, to compare different alternative models (e.g., dimensioning) or scenarios (e.g., building types).

Voraussetzungen

- Excel and VBA

Betreuer:

Implementation of Energy-Aware Algorithms for Service Function Chain Placement

Beschreibung

Network Function Virtualization (NFV) is becoming a promissing technology in modern networks. A challenging problem is determining the placement of Virtual Network Functions (VNFs). In this work, we plan to implement existing algorithms for embedding VNFs chains in NFV-enabled networks. 

Voraussetzungen

Experience in Python or Java, object oriented programming

Kontakt

amir.varasteh@tum.de

Betreuer:

Working student for the PCN lab

Stichworte:
SDN, P4
Kurzbeschreibung:
The Prgrammable Communication Networks lab offers the opportunity to work with interesting and entertaining projects related to the Software-Defined Networking (SDN) and Programmable Data Planes (PDP) paradigms. For the next semester, a position is available to assist on the lab doing the student supervision during the lab sessions.

Beschreibung

The Prgrammable Communication Networks lab offers the opportunity to work with interesting and entertaining projects related to the Software-Defined Networking (SDN) and Programmable Data Planes (PDP) paradigms. For the next semester, a position is available to assist on the lab doing the student supervision during the lab sessions.

Voraussetzungen

  • Solid knowledge in computer networking (TCP/IP, SDN, P4)
  • Solid knowledge of networking tools and Linux (iperf, ssh, etc)
  • Good programming skills: C/C++, Python

Kontakt

Please send your transcript of recrods and CV to:

Cristian Bermudez Serna - cristian.bermudez-serna@tum.de

Nicolai Kröger - nicolai.kroeger@tum.de

Betreuer:

Cristian Bermudez Serna, Nicolai Kröger, Kaan Aykurt