Welcome to the Media Center, where you can find the latest original video content from ComSoc's conferences and events. Featuring keynotes speakers, executive forums, keynote workshops, industry panels, and much more from ComSoc's events, including the IEEE Global Communications Conference (GLOBECOM) and the IEEE International Conference on Communications (ICC). These videos bring insights to you when you need it. Your ComSoc membership offers free access to many of these valuable contents simply by logging in with your IEEE account.
IEEE and Non-Members can purchase videos after logging into their IEEE Account. If you do not have an IEEE account, click 'Create Account" to create a FREE account to make a purchase.
Not a member? Join ComSoc Today
IEEE Members can add ComSoc to their membership
Smart City and Healthcare Systems for Pandemic
Megatrends to Roadmaps to Standards: IEEE Networks Panel
Megatrends in Wireless Communication include electrification; data, bandwidth, latency, automation, and AI; along with current technologies and future requirements. These Megatrends have broad implication across the Communications space and will influence the upcoming releases of the existing IEEE Networks Generation Roadmap (INGR). The panelists will describe: - What is a Technical Roadmap, and what is currently included in the INGR - A current view of Communication Megatrends - How these Megatrends may influence future INGR releases - Opportunity for the Communications Industry to incorporate Megatrends into the INGR roadmap Note: One or more presenters may be remote.
Accelerating Industry via Mission-critical Networks: Real-World Stories and Forward-Looking Apps
This panel include experts from world leading industries to identify what has been achieved so far and what is still to be done for boosting current production processes through mission-critical wireless networks. This panel will help both academic and industrial communities to prioritize their backlog for more focused effort towards the most needed solutions for 5G and beyond, focusing on open problems and forward-looking use cases.
The Future of Communication Networks in Developing Countries
This Executive Forum is on "The Future of Communication Networks in Developing Countries".
6G Research & Innovation Cluster (6G-RIC): A Perspective on Sub-THz Communication and Sensing
The exploitation of the large portions of available spectrum in the sub-THz band (90-300GHz) is one of the most promising directions for enhancing the capacity of current wireless access networks. However, several formidable technological, societal, and business challenges need to be addresses, in particular related to the development of economically attractive and energy efficient solutions. A part from its obvious impact in terms of costs and range of use cases, energy efficiency is a crucial parameter in the context of the ambitious climate targets imposed, for instance, by the German and Brazilian governments. Addressing these challenges requires a complete rethinking of the entire value chain of communication systems, and hence a continuous interaction between academia, industry, government, and public interest organizations. Furthermore, possible synergies with new promising paradigms such as reflective intelligent surfaces (RISs) or integrated sensing and communication (ISAC) need to be explored. Following the above spirit, this panel will bring together experts from top Brazilian institutions, and prominent partners of the German 6G Research & Innovation Cluster (6G-RIC). The 6G-RIC is a research hub designed to provide scientific and technical foundations for the next generation of mobile communications, and it is financed by the Federal Ministry of Education and Research of Germany. It is based on the interdisciplinary and coordinated collaboration of a total of 32 research groups from 20 universities and research institutions, supported by more than 60 associated partners from science, industry, and governing bodies.
Evolving Cryptography
Global cybercrime is expected to reach 10.5 trillion USD by 2025 with an annual increase of 15 percent from 3 trillion USD in 2015. As communication technology evolves and the world gets more connected, the need for securing network communications is ever increasing. Cryptographic Algorithms, such as AES and RSA, are widely used to secure two-way communications between clients and servers on the internet and are also ubiquitous in high security applications such as credit cards, military communications etc. AES is still considered secure even when it is published, as long as the private key is kept secure. However, if an attacker obtains the private key, the security is compromised and may stay compromised for a long time until the user detects this breach and then changes the key. We present a novel approach to cryptography through which the modules of an algorithm such as Confusion, Diffusion, and KeyMixing etc. are evolved to produce cryptographically secure Customized Encryptors. These evolutionary encryption methods maintain security even after the encryption key has been compromised. At least one parameter or a transformation (Confusion Box/ Diffusion Box/ Key Mixing/ Round Logic) may be modified periodically in an encryption algorithm to temporally evolve its behavior by creating a genetically modified variant of the original algorithm. This reduces an attacker's awareness of the structure and operation of encryption algorithm by adding security in the behavior dimension independent of the key. Modifications may be event based, for instance, at the start of a new communication session, periodic, every few milliseconds, or based on a counter of few bytes of data passed. By evolving AES 128, our solution provides a cryptographic strength of 2908 bits while running at a fraction of the processing power of AES 256 that only provides 256 bits security.
Multi-cloud deployment of 5G Networks with Proactive and Polymorphic Orchestration
Motivation of the presentation: The complexity of multi-cloud and edge deployment of 5G raises many challenges related to an efficient deployment across different cloud domains (public and private) as well as how to optimally adapt to changing workloads and application's requirements. The MORPHEMIC platform provides a novel approach of adapting and optimizing cloud and edge computing applications by introducing the concepts of polymorphic and proactive adaptation. The description of the Cloud and Edge applications is enclosed in a very expressive Cloud Application Modelling and Execution Language (CAMEL) formalism allowing for definition of deployment requirements, as well as utility-based deployment optimisation. The objective of this demo is to showcase an example of deploying 5G as a form of disaggregated radio access network (RAN) in the intelligent multi-cloud environment by using the Morphemic platform. Context of the presentation: The industrial presentation will start by providing a technical background behind intelligent multi-cloud deployment of 5G networks. The economic justification of disaggregated 5G and several aspects of Open RAN deployment in the multi-cloud environment of 5G will be provided to reflect the benefits of the MORPHEMIC platform. Moreover, a vision of multi cloud deployment of the RAN components (e.g., RU/DU/CU) will be presented and the deployment is fueled by utility-based optimization as well as AI based prediction mechanism harnessed into a proactive adaptation scheme. This part of the will also addresses both the challenges and the approach related to multi-cloud deployment of 5G networks. A practical demonstration by providing a glimpse into the real deployment of the 5G RAN components in the multi-cloud environment, the role of the orchestrator to provision the RAN will be the key elements of the presentation.
Testing Considerations for AI and ML in Wireless Networks
Artificial Intelligence (AI) and Machine Learning (ML) are core technologies that will pervasive and expansive in 6G. Thinking about how to test AI/ML communications systems present new challenges compared to traditional methods. There are 3 different types of AI/ML testing to consider—datasets (recorded from real world scenarios or artificially generated) are needed to train the AI/ML, AI/ML based test can be applied to wireless networks (for example, an AI/ML based signal identification), and finally testing to look at the performance of the AI/ML algorithm itself at a subcomponent level and at a system level. This session will dive into each of these three areas with a goal to leave attendees with a better understanding what test and validation means for AI and ML in wireless systems.
Toward Industrial Metaverse and Industry 5.0: Enabling Technologies and Research in 6G
The fifth generation (5G) network, promising to provide enhanced mobile broadband (eMBB), mission-critical internet of things (IoT), and massive IoT, aims to be the digital transformation enabler in all industry sectors. Moving to 2030, the physical world, digital world, and human world will be even more seamlessly connected and interacted, creating brand new experiences in work, leisure, learning, study, and social activities, accelerating the digital transformation in processes and practices in all industry sectors and public services. These will form the core driver for 6G innovation.
Achieving Truly Immersive Holographic-Type Communication
This keynote talk will first present a review of video streaming over telecommunication networks, and its evolution over time, taking also the important evolution towards network softwarizaton into account. The importance and the opportunities provided by volumetric media delivery will be outlined by means of several examples. The most appropriate management platform design for volumetric media delivery and the various challenges and possible approaches will be highlighted next. Finally an overview of research challenges and opportunities will be presented to stimulate further collaborative research in this exciting area.
6G for Verticals - What Can We Do Better Than 5G?
Future G Research Platforms
This panel will discuss the critical enabling technology that the community wants to develop for 6G, and possibly beyond, so that the future standards can be shaped accordingly. The science of Digital Infrastructures raises multiple complex challenges to the research community that already started to explore them with an agenda towards 6G!. Experimentation is becoming an even more important methodology to assess and qualify the diverse design assumptions and choices in realistic conditions.
Bill of Materials (BOMs): A Prerequisite Solution for Next Generation Networks
xBOMs are the foundation to Enable; Chain of Custody and Security Operations for Network Virtualization From the National Telecommunications and Information Administration's SBOM FAQ "A Software Bill of Materials (SBOM) is a complete, formally structured list of components, libraries, and modules that are required to build (i.e. compile and link) a given piece of software and the supply chain relationships between them. These components can be open source or proprietary, free or paid, and widely available or restricted access." Infrastructure is defined as a standard implementation of services required to securely operate, manage and support IT/OT infrastructure including sharing of information, solutions, devices and users. Considerable effort has and is being invested in the definition, implementation and use of SBOMs to reduce security risks and improve software development and support processes. Similar efforts related to hardware identification should occur using similar SBOM concepts to mitigate failures and security risk. SBOMs and hardware (HBOMs) concepts can be applied to network design, security, operation and performance optimization. Implementing xBOMs to simplify the processes to deliver complex tasks required to operate, manage and support a new infrastructure is the focus of this presentation. There are 3 types of BOMs discussed in the Industrial Internet Consortium (IIC) Secure Communications Infrastructure by Design (SCID) Group: NBOM - Network connection points and properties SBOM - Software and supply chain (includes network and hardware software) HBOM - Attached hardware and dependencies Important questions need to be asked related to: What happens when you link xBOMs together? How are security operations impacted by xBOM operations? What are the tools required for a new core infrastructure: Path management Packet Management QoS Inventory management Error management Some of these tools and concepts will be addressed in this presentation.
Explainable, Causal and Safe AI Techniques for Network Automation Operations
The motivation of this industrial presentation is to provide the GLEBECOM community with recent research findings in explainable, causal and safe AI techniques that support trustworthiness in various network operations and use cases. Ericsson researchers are leading in the field of the aforementioned technologies and we believe this talk will provide with new insights in telecom domain, from an industrial perspective, and give the opportunity to research, industrial or other participants to exchange ideas and enhance collaboration opportunities. The presentation will include the four aforementioned speakers in on the following topics: 1. Explainable AI (XAI) and Explainable RL (XRL): Motivating the need of Explainable AI and XRL, the XAI framework, and with the examples form telecom industry implementing XAI and XRL. 2. Symbolic safe reinforcement learning for RAN control that provides novel formal techniques that assure safe learning in live deployment of RL agents on the network. 3. Causal AI: Causal ML and RL models have better sample efficiency and improved out-of distributional generalization compared to models built on observational data only. We will demonstrate impact of Causal AI for Telecom problems, such as Radio root cause analysis and fronthaul congestion control. 4. Trustworthiness measures. The aim is to provide means to measure and analyze the properties and performance of different explanation methods by exploration and implementation of metrics.
Concurrently Deploying Multiple Vertical Use Cases in a Cost-Efficient Way
As 5G is widely deployed to provision network services for various vertical industrials, it becomes essential for mobile operators to design and optimize the deployment strategies of network slicing such that multiple vertical customers can be served concurrently with assured quality of services (QoS) whereas the operational cost efficiency is improved for mobile operators. One fundamental capability required is to create multiple network slices and associate them with vertical applications. The deployment strategies answer several key questions, such as: "How many network slice instances should be created to serve all subscribed vertical customers?"; "How these network slice instances should be isolated to assure the QoS and quality of experience (QoE) of these customers?"; "How the cost efficiency could be improved? e.g., via resource sharing, which, however, contradicts the isolation requirement". The answer to these questions decides the values created by network slicing to both mobile operators and vertical industries. Deploying the network slices and vertical applications according to the decided strategies imposes a series of challenges, particularly the unprecedent complexity in integration caused by the multi-vendor and multi-tenant deployment environment. Then enabling technologies are demanded to facilitate the practical deployment, e.g., automation, intelligence, integration, and open APIs. This presentation first revieWS- the requirements of deploying multiple network slices and services in 5G, followed by the current status of typical deployment decisions. Then challenges and open questions are overviewed for the future work.
DNS Correlation: The Good, the Bad and the Solution
Network data correlations are widely used to obtain multi-dimensional traffic information. Netflow streams, for instance, are correlated with BGP to generate enriched information about the ASes, IP-Addresses, and traffic volume. However, this is not enough to know the applications/infrastructures behind those IP-Addresses/ASes. Currently, we have different applications (Disney+, AmazonPrime) using different infrastructures (CDNs) to distribute their content. In this context, two key questions are missing to answer: What are those applications/infrastructures and how much traffic comes from them?. The DNS correlation is to annotate the traffic information with the domain name they came from, so that two new dimensions can be obtained: infrastructure and application. With those new dimensions, it is possible to know, for example, the amount of traffic which the Disney+ application is providing over different infrastructures such as akamai.net, fastly.net, etc. The DNS correlation, however, is not an easy task and there are a set of research/technical challenges. This presentation covers the main aspects of how Benocs is dealing with this topic: from the motivation (the good), going through the challenges (the bad), until the PoCs/implementations (the solution) to finally generate a new product that extends our current analytics/visualizations tools.
Generative Network Performance Prediction
The presentation is about a solution to improve and streamline industrial private wireless network performance predictions using generative digital twin models. There are several open problems in designing, delivering, and maintaining private wireless networks for autonomous industrial settings. In these dynamic environments with changing use cases and SLA profiles, immediate detection of performance problems becomes critical. The existing instrumentation methods proven useful for public networks are not as effective for maintaining these private industrial networks, where use-case-dependent performance prediction becomes a necessity. The described solution builds on the existing Nokia Digital Twin platform used for continuous testing and SLA management of 5G networks for industrial automation. The solution first builds an association between the field measurements and the digital representations of the environment by making use of Deep Neural Network (DNN) techniques. Then in subsequent steps, Generative Adversarial Network (GAN) methods are used to create what-if scenarios with alternate equipment and layout configurations to examine potential concerns, and to explore options towards more optimal performance outcomes.
NextG System Resiliency Improvements Through End-to-End Analytics
The minimum technical performance requirements as specified in REPORT ITU-R M.2410 does not include resiliency as a requirement for 5G technologies. However, to support mission critical application, NextG/6G technologies must provide resiliency guarantees. In this talk, we provide a meaningful way to define and measure resiliency and argue that standardization bodies need to include resiliency requirements in minimum technical performance requirements from NextG/6G (IMT 2030). We will start by highlighting some important characteristics of highly resilient systems and argue that adding network situational awareness will improve overall system resiliency. We will then talk about some of the analytics framework specified by the 3GPP and how they can be utilized and enhanced to provide end-to-end situational awareness and connected intelligence. Finally, we will illustrate, using a real-world use-case involving mobile edge computing, how the ideas presented in this talk can be applied to realize resiliency improvements.
Digital Transformation: Accelerating the "Already Fast"
The 2022 Globecom event theme, “Accelerating the digital transformation…” seems redundant. Large parts of our global society rely upon desktop and portable computation for major percentages of day-to-day activities from work to hobbies to entertainment to daily necessities like shopping for needed supplies and paying for utilities. There are more mobile phone subscriptions in the world than there are people and there is a saturated percentage of those subscriptions associated with smartphones. We walk around with digital Bluetooth earbuds, pay with digital credit cards, and speak on digital phone lines. Even “analog” industries like those of the automobile are digital—major automotive supply shortages in the last year are due to inadequate capacity in the digital supply chain! So, what in the world do we need to accelerate when it is obvious to even the casual user that we are already there! Maybe we are not there yet—some things remain to be transformed or are only beginning to “scratch the surface”. This talk will explore territory we still need to transform—we have an internet of things but the data from disparate systems (e.g. parking management and traffic flow) is not used in a single management system. Accomplishing automated driving and management of transportation is still years away. We use computers to educate, but what more could we do with interactive holographics? And all the while we admire our excellent computation and communications systems while large portions of the world, and even large portions of sophisticated and rich societies go unserved. Digitizing farming, for example, awaits our ability to provide adequate coverage for large-scale rural geography. And managing each of these means moving to ever-smarter communications with high-performance, and flexible programmable networks. I will conclude with how we need to work together to drive this innovation and work to ensure it is working as expected, in a sustainable manner, and with the highest possible level of security.