The Fifth International Conference on Big Data, Small Data, Linked Data and Open Data

ALLDATA 2019

March 24, 2019 to March 28, 2019 - Valencia, Spain

Deadlines

Submission

Dec 10, 2018

Notification

Jan 10, 2019

Registration

Jan 24, 2019

Camera ready

Feb 04, 2019

Deadlines differ for special tracks. Please consult the conference home page for special tracks Call for Papers (if any).

Publication

Published by IARIA Press (operated by Xpert Publishing Services)

Archived in the Open Access IARIA ThinkMind Digital Library

Prints available at Curran Associates, Inc.

Authors of selected papers will be invited to submit extended versions to a IARIA Journal

Indexing Procedure

Affiliated Journals

ALLDATA 2019 - The Fifth International Conference on Big Data, Small Data, Linked Data and Open Data

March 24, 2019 - March 28, 2019

ALLDATA 2019: Tutorials

T1. Robustness Testing of Complex Software Systems to Improve Operational Reliability
Speaker: Vincent Sinclair, Bell Labs Software and Systems Reliability, Nokia, Dublin, Ireland
Authors:
Vincent Sinclair, Bell Labs Software and Systems Reliability, Nokia, Dublin, Ireland
Dr. Abhaya Asthana, Bell Labs Software and Systems Reliability, Nokia, Westford, Massachusetts, USA

Objective

Software robustness is the degree to which a system or component can function correctly in the presence of invalid inputs or stressful environmental conditions. While software testing typically does a very good job of testing the functional requirements of a solution, there is less focus on testing for software robustness. This results in software with significant robustness vulnerabilities escaping to the field, which can lead to service affecting outages.

The tutorial will be driven by the results from extensive software robustness testing workshops completed in 2017 and 2018. We will present examples of typical software robustness defects in a telecommunications network. Using these examples as input, we will explore how to build a comprehensive software robustness test strategy and test plan to prevent such defects escaping. We will explore the critical and often overlooked need for input to the robustness test plan from the systems engineers, architects, designers and the customer facing support team. Having identified the areas to focus on for software robustness testing, we will demonstrate many examples of test cases used to uncover software robustness defects. Finally, we will explore ways to extend the typical stability testing to more aggressively stress the software to discover underlying robustness type faults.

Summary

  • Typical software robustness defects
  • How to build a comprehensive software robustness test plan
  • Break
  • Building robustness test cases, with many detailed examples of test cases
  • Extending the typical stability testing to discover robustness type defects
  • Questions and answers

Audience

The tutorial would be beneficial for both practitioners and researchers in the testing domain.
Practitioners involved in the testing of complex software solutions, including feature testing, interface testing, performance and stress testing as well as those testing at the solution level will benefit from insights to the real-world software robustness problems in complex software systems. On the other hand, researchers on software testing will benefit from insight into real field experiences from around the world and gain deep insight into the main challenges related to robustness testing of complex software systems. Building a complete software robustness test plan needs critical input from systems engineers, architects, designers and technical support personnel and people with interest in these domains would also benefit greatly from this tutorial.

Takeaways

The tutorial will provide a solid understanding of the elements needed to build a complete software robustness test plan. It will detail how to build up a test plan through effective engagement with all the key functions along the life cycle. It provides a framework to enable teams to build their own software robustness test plans. Finally, the tutorial will demonstrate many real-world examples of software robustness test cases.

 

T2. Beyond WiFi-based Wireless Sensor Networks
Speaker: Prof. Dr.  Sandra Sendra Compte, University of Granada, Spain

Wireless sensor networks have been consecrated, over the years, as the integral solution to solve most of the daily problems. Currently, the field of application of the WSNs ranges from basic tasks of environmental monitoring in rural, urban or domestic areas to complex intelligent systems for monitoring large cities and industrial processes, considering, at the same time, very sensitive areas/services such as health and the welfare of people.

Until very recently, one of the main technologies used to deploy this type of networks has been the IEEE 802.11 standard and all its variants. But, with the technological immersion and the expansion of the Internet of Things (IoT) concept, the intrinsic problems of the devices based on this technology are relegating it to a background level in monitoring issues. This is giving way to the era of long range (LoRa) technologies. For this reason, this tutorial aims to do a quick review of the features that Wi-Fi-based WSN offered us and to see how the natural evolution of the WSNs is leading us to the use of technologies such as LoRa /LoRaWAN.

Special attention will be paid to the operating characteristics of LoRa/LoRaWAN that make this technology so attractive showing the most appropriate application areas for this type of networks. The tutorial will also show a solution to seamlessly integrate LoRa/LoRaWAN with 4G/5G mobile networks, thus allowing mobile network operators to reutilize their current infrastructures.

Finally, this tutorial will show several current applications where the solution is currently being used, followed by a discussion on the challenges and open research issues in the area.

 

T3. Advanced Management and Control in 5G Sliced Networks
Speaker: Prof. Dr. Eugen Borcoci, University POLITEHNICA of Bucharest, Romania

Prerequisites: general knowledge on IP layered architectures, protocols, networks and services management, introductory knowledge on 4G/5G, SDN,  ETSI-NFV, Cloud/Fog  computing.

The 5G (fifth generation) is a novel architecture and also a technology of mobile networks, aiming to accommodate the current and future growing demands of users, services and applications. The 5G capabilities are expressed in terms of flexibility, high capacity, broadband access, high number of terminals, dense deployments, low response time, low energy consumption, end-to-end (E2E) services, multi-tenancy, multi-domain and so on. 5G is intended to support a large range of services applications such as broadband mobile applications, massive Internet of things, machine-type communications, mission critical, ultra-high reliability and low latency applications, content–oriented services, vehicular applications, e-health, etc. There is a wide range of research and development projects related to different areas of the 5G network in 5G Infrastructure Public-Private Partnership (5G PPP phase I and II).

In contrast with the current concept of 4G, i.e., “one network fits all”, in 5G the concept of customized network slicing is fundamental, enabling resource sharing among multiple tenants, network operators and/or services, but assuring controllable levels of slices logical isolation. The slices can be created by provisioning or on demand; they should be able to span all network segments (access, core, transport) over multiple administrative domains and multi-operator environments, offering full E2E capabilities to the users. The slicing mechanisms should enable tenants to benefit of sharing, while retaining the ability to customize their own slices. Supporting technologies allow softwarization, like  Software Defined  Networking (SDN), Network Function Virtualization (NFV) and cloud/fog/edge computing; they  are naturally embedded in 5G architectures.

A powerful management and control system is necessary in 5G network slicing, to create and control all functionalities. The ETSI Management and Orchestration (MANO) framework is taken as a basis, with additional specific modules to support slicing. The MANO enables network flexibility and programmability, by creation and  lifecycle management of virtual network slices tailored to the needs of 5G verticals, expressed in the form of Mobile Virtual Network Operators (MVNOs) for automotive, eHealth, massive IoT,or massive multimedia broadband. The management and control system should react in real-time, based on a hierarchy of complex decision making techniques that analyse historical, temporal and frequency network data. Recently, cognitive network management techniques are proposed as a solution for the above requirement, in which machine learning is used to develop self-aware, self-configuring, self-optimization, self-healing and self-protecting characteristics of the overall management system.

This tutorial offers an overview on the above mentioned advanced management and control techniques in 5G slicing.