xgnlab
Global Community of People and Entities Contributing for Next Generation Networks Ecosystems - 4G/5G. Any Member, individual or a company, here has no liability to others and even to xgnlab, vice a versa, it's a platform to showcase or share their work and knowledge only.
GA
Translate
Recent Most Popular
-
Today Verizon Business announced its new private 5G network offering, On Site 5G, which is being marketed to large enterprises and public se...
-
Q: Based on our discussion and the discussion you've been having with people in the industry, what's your outlook for the relati...
-
FCC chairman Mr Pai, known for his quick and fast decision making capabilities and abilities, said here in INDIA IMC 2018, that he does not ...
-
Akraino Edge Stack , a Linux Foundation project initiated by AT&T and Intel, intends to develop a fully integrated edge infrastructur...
-
A 20 MHz OFDMA channel consists of a total of 256 subcarriers (tones). These tones are grouped into smaller sub-channels, known as resour...
-
In Forrester's evaluation of the emerging market for enterprise container platform (ECP) software suites, they identified th...
-
Massive MIMO (mMIMO) and beamforming are buzzwords widely used in the telecom industry when referring to 5G and latest advancements of LT...
Wednesday, 25 January 2023
verizon pvt 5G strategy for industry 4.0
Thursday, 22 December 2022
CSI-RS Classification and Role - 5G NR
Wednesday, 21 December 2022
5G- Beam forming, Beam Steering, and MIMO - simplified.
Saturday, 27 June 2020
WBA OpenRoaming - An ubiquitous WiFi experience across the world
What is OpenRoaming?
- Higher quality of service
- No need to track or switch among SSIDs
- A single log-on experience
- Business incentives, primarily through simplicity, to adopters
- Ease of regulatory compliance
- Passive authentication
Tuesday, 12 March 2019
5G Race, from marketing stunt to political mileage.
Almost since 5G first grabbed the industry's attention, US telcos have been crowing about their investment in the next-generation mobile standard. And, rightly or wrongly, an impression has taken hold that America is a frontrunner in the 5G race. Only this week, a report from Arthur D. Little, a respected consultancy, ranked the US just behind South Korea in its new 5G country leadership index (see below). Other commentators point to major equipment deals for Ericsson and Nokia, and enthusiastic announcements about 5G launches, as evidence of the US position.
But it's all just marketing flimflam, according to one of the UK's top executives involved in the rollout of 5G technology. Light Reading spoke with Scott Petty, the chief technology officer of Vodafone UK, on the sidelines of a press briefing in London this week, and his verdict on claims of US 5G leadership was damning. "Only the Chinese are ahead of the UK. The US is miles behind," Petty told Light Reading. "They are making it up. They are rebadging 4G Evolution as 5G."
This would seem like chest-thumping for the UK telecom sector were it not for the fact that US boasts have never quite made sense.
For one thing, the 5G equipment vendor that just about every non-US telecom executive thinks of as the world's best -- China's Huawei -- is effectively barred from doing business with the main US operators. Elsewhere, even telcos ripping out Huawei's equipment, or promising not to use its 5G products, rank it ahead of Ericsson and Nokia. How can a country that excludes the world's "only true 5G vendor," in the words of BT's Neil McRae, be a 5G leader?
Very nicely put, get full article HERE
Monday, 11 March 2019
Akraino Edge Stack from Linux Edge Linux fundation
- Telco NFV Edge Infrastructure - Running cloud infrastructure at the network edge allows for the virtualization of applications key to running 5G mobility networks at a larger scale, density and lower cost using commodity hardware. In addition this infrastructure can also enable the virtualization of wireline services, Enterprise IP services and even supports the virtualization of client premises equipment. This reduces the time to provision new services for customers and even, in some cases, allows those customers to self-provision their service changes.
- Autonomous devices - Drones, Autonomous Vehicles, Industry Robots and such customer devices require a lot of compute processing power in order to support video processing, analytics and etc., Edge computing enables above-said devices to offload the computing processing to the Edge within the needed latency limit.
- Immersive Experiences - Devices like Virtual Reality (VR) headsets and Augmented Reality applications on user’s mobile devices also require extremely low levels of latency to prevent lag that would degrade their user experience. To ensure this experience is optimal, placing computing resources close to the end user to ensure the lowest latencies to and from their devices is critical.
- IoT & Analytics - Emerging technologies in the Internet of Things (IoT) demands lower latencies and accelerated processing at the edge.

Network Edge - Optimal Zone for Edge Placement

Akraino Edge Stack

Sunday, 3 March 2019
It’s going to be massive scale. And this has huge implications for all - Chuk Robbins CISCO CEO
Friday, 15 February 2019
IP Tables in Linux - A Tutorial
- iptables applies to IPv4.
- ip6tables applies to IPv6.
- arptables applies to ARP.
- ebtables applies to Ethernet frames..
- /etc/init.d/iptables – init script to start|stop|restart and save rulesets.
- /etc/sysconfig/iptables – where Rulesets are saved.
- /sbin/iptables – binary.

Fig: IPTables Table, Chain, and Rule Structure
I. IPTABLES TABLES and CHAINS
1. Filter Table
- INPUT chain – Incoming to firewall. For packets coming to the local server.
- OUTPUT chain – Outgoing from firewall. For packets generated locally and going out of the local server.
- FORWARD chain – Packet for another NIC on the local server. For packets routed through the local server.
2. NAT table
- PREROUTING chain – Alters packets before routing. i.e Packet translation happens immediately after the packet comes to the system (and before routing). This helps to translate the destination ip address of the packets to something that matches the routing on the local server. This is used for DNAT (destination NAT).
- POSTROUTING chain – Alters packets after routing. i.e Packet translation happens when the packets are leaving the system. This helps to translate the source ip address of the packets to something that might match the routing on the desintation server. This is used for SNAT (source NAT).
- OUTPUT chain – NAT for locally generated packets on the firewall.
3. Mangle table
- PREROUTING chain
- OUTPUT chain
- FORWARD chain
- INPUT chain
- POSTROUTING chain
4. Raw table
- PREROUTING chain
- OUTPUT chain

II. IPTABLES RULES
- Rules contain a criteria and a target.
- If the criteria is matched, it goes to the rules specified in the target (or) executes the special values mentioned in the target.
- If the criteria is not matached, it moves on to the next rule.
Target Values
- ACCEPT – Firewall will accept the packet.
- DROP – Firewall will drop the packet.
- QUEUE – Firewall will pass the packet to the userspace.
- RETURN – Firewall will stop executing the next set of rules in the current chain for this packet. The control will be returned to the calling chain.
# iptables -t filter --list Chain INPUT (policy ACCEPT) target prot opt source destination Chain FORWARD (policy ACCEPT) target prot opt source destination Chain OUTPUT (policy ACCEPT) target prot opt source destination
# iptables -t mangle --list
# iptables -t nat --list
# iptables -t raw --list
# iptables -t filter --list (or) # iptables --list
# iptables --list Chain INPUT (policy ACCEPT) num target prot opt source destination 1 RH-Firewall-1-INPUT all -- 0.0.0.0/0 0.0.0.0/0 Chain FORWARD (policy ACCEPT) num target prot opt source destination 1 RH-Firewall-1-INPUT all -- 0.0.0.0/0 0.0.0.0/0 Chain OUTPUT (policy ACCEPT) num target prot opt source destination Chain RH-Firewall-1-INPUT (2 references) num target prot opt source destination 1 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 2 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmp type 255 3 ACCEPT esp -- 0.0.0.0/0 0.0.0.0/0 4 ACCEPT ah -- 0.0.0.0/0 0.0.0.0/0 5 ACCEPT udp -- 0.0.0.0/0 224.0.0.251 udp dpt:5353 6 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:631 7 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:631 8 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 9 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:22 10 REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
- num – Rule number within the particular chain
- target – Special target variable that we discussed above
- prot – Protocols. tcp, udp, icmp, etc.,
- opt – Special options for that specific rule.
- source – Source ip-address of the packet
- destination – Destination ip-address for the packet