Abdul Fikih Kurnia

@abdfikih

Joined on Dec 31, 2023

  • KPI Monitoring Overview image LTE eNB and 5G NR gNB produce data that can be monitored and analyzed to measure the system’s effectiveness. The near Real-Time RIC can gather the radio and system Key Performance Indicators (KPI) from E2 Nodes and can utilize the metrics for closed-loop control. The KPI includes but not limited following; UE measurement, E2 Node Measurement, E2 Node Load-related measurement. The KPIMON xApp provides the first step towards the successful closed-loop control, through the monitoring E2 Node’s performance metrics, and writing it into Redis DB. With the near real-time reporting KPIs, the near Real-Time RIC can immediately control E2 Nodes. Dms-cli and helm commands Set up environment variables for CLI connection When using the dms-cli commands, we need to set up the environment variable "CHART_REPO_URL" #Create a local helm repository with a port other than 8080 on host
     Like  Bookmark
  • O-RAN Architechture Diagram RT Lab :::info Background Knowledge A RAN Intelligent Controller (RIC) is a crucial software-defined component within the Open Radio Access Network (Open RAN) architecture, designed to manage and enhance RAN functions. It promotes multivendor interoperability, intelligence, agility, and programmability, enabling the integration of third-party applications to automate and optimize RAN operations at scale. This results in reduced total cost of ownership (TCO) for mobile operators and improved quality of experience (QoE) for users, making the RIC a key element in the Open RAN strategy to create flexible, efficient, and cost-effective networks. The near-RT RIC is a logical function that optimizes and controls O-CU and O-DU nodes in near-real-time (10 ms to 1 s), guided by policies and models from the non-RT RIC. It manages RAN infrastructure at the cloud edge, hosting cloud-native, microservice-based applications called xApps. The E2 interface facilitates the RAN closed-loop control by enabling the RIC to enforce control and policy decisions towards the RAN. It also supports data collection and feedback mechanisms, providing critical information to the near-RT RIC for real-time optimization and management of the network.
     Like 4 Bookmark
  • 5G’s O-RAN E2 interface workIntroduction Role of near-RT RIC and its functionalities E2 protocol stack E2AP Terminologies Constituents of an E2 Node Structure of E2AP General workflow on E2 interface A practitioner’s view of E2AP Protocol and challenges in adopting Near RT RIC and E2 Communication
     Like 1 Bookmark
  • E2 Simulator image Flow Function Upon startup, Simulator generates E2 Setup Request For each E2SM that is registered, include RAN function definition Upon receiving incoming requests, decode Identify RAN function ID Call appropriate callback function for RAN function ID and request type Provide entire encoded request
     Like 1 Bookmark
  • Architecture image OAI-CU lsb_release -a #ubuntu version lscpu #cpu sudo dmidecode -t memory | grep -i size #memory sudo lshw -short -C disk Hardware
     Like  Bookmark
  • Wireshark What is Wireshark? Wireshark functions as a network packet and protocol analyzer, proficient in capturing and displaying detailed packet data. Its primary role is to capture network packets, striving to present the packet information in the most comprehensive manner possible. Widely regarded as one of the top open-source packet analyzers, Wireshark is highly esteemed for its effectiveness on both UNIX and Windows platforms. Formerly known as Ethereal, Wireshark offers a versatile approach to traffic analysis, allowing users to delve into the intricacies of network communication at different levels. It enables examination ranging from connection-level details to the binary bits constituting individual packets. Through packet capture, Wireshark provides a wealth of information to network administrators, including transmit time, source and destination addresses, protocol types, and header data for each packet. This granular packet-level insight proves invaluable for evaluating security events and effectively troubleshooting issues related to network security devices. Fact About Wireshark
     Like  Bookmark
  • Prerequisite Install Kubernetes with kubespray python3 --version # Version should upper or equal to 3.9 apt install -y python3-pip output : root@teep-template:~# python3 --version # Version should upper or equal to 3.9 apt install -y python3-pip Python 3.10.12 Reading package lists... Done
     Like  Bookmark
  • Clone Repo git clone -b master "https://gerrit.o-ran-sc.org/r/smo/o1" output: root@node1:~# git clone -b master "https://gerrit.o-ran-sc.org/r/smo/o1" Cloning into 'o1'... remote: Counting objects: 1, done remote: Total 96 (delta 0), reused 96 (delta 0) Receiving objects: 100% (96/96), 107.65 KiB | 246.00 KiB/s, done.
     Like  Bookmark
  • Environment Hardware requests : RAM : 8G RAM CPU : 6 core Disk : 40G Installation Environment: VM:Ubuntu 20.04 LTS (Focal Fossa)
     Like  Bookmark
  • image image image image image
     Like  Bookmark
  • image image image image image
     Like  Bookmark
  • image image image image image
     Like  Bookmark
  • image image image image image
     Like  Bookmark
  • 5G-ORAN Uploading file..._glwvna7kg image image image image
     Like  Bookmark
  • Prerequisites Linux Kernel Version Kernel mus version 5.0.0-23-generic or 5.4.x version of the Linux kernel. free5gc uses the gtp5g kernel module, which has been tested and compiled against that kernel versions only. uname -r image Install Golang Install Golang with compatible version :
     Like  Bookmark
  • Personal Information Name: Abdul Fikih Kurnia Email: abdulfikihk@gmail.com Dept./Univ.: Dept. of Electrical Engineering/Universitas Indonesia GPA: 3.84/4.00 Intern Topic: Energy Saving in ORAN System Mentor: LTY and Angel Navigation Road Map
     Like  Bookmark
  • What is 5G? Fifth Generation (5G) technology represents the latest evolution in wireless communication systems, designed to provide unprecedented levels of connectivity, speed, and reliability. 5G goes beyond simply enhancing mobile broadband; it introduces a diverse range of applications and services by significantly increasing data transfer rates and reducing latency. Operating on higher frequency bands, 5G utilizes millimeter waves to transmit data, allowing for faster communication between devices. This enables a multitude of applications, including augmented reality (AR), virtual reality (VR), autonomous vehicles, and the Internet of Things (IoT), to flourish with minimal delay. 5G architecture is characterized by a more decentralized and flexible network, emphasizing the use of software-defined networking (SDN) and network function virtualization (NFV). This shift enhances network efficiency, enabling dynamic resource allocation based on demand. The deployment of small cells, massive MIMO (Multiple Input Multiple Output), and beamforming techniques further enhances coverage and capacity. Explained 5G Core
     Like  Bookmark
  • What is Ping? A ping, or Packet Internet or Inter-Network Groper, functions as a fundamental Internet tool in computer network administration. It allows users to test the existence and responsiveness of a specific destination IP address. The term "ping" was coined to match the sound of a returned sonar pulse used by submariners. Beyond its diagnostic role in ensuring the operational status of a host computer, ping is widely supported by operating systems and embedded network administration software. For instance, Windows or Ubuntu users can use the command prompt (start/run/cmd) to input "ping xxxxx.yyy" (where "xxxxx" is the second-level domain name like "abdfikih," and "yyy" is the top-level domain name like "site") to discover the corresponding dot address, such as 192.168.1.10, for a given domain name. How it's Work? Ping operates by using the Internet Control Message Protocol (ICMP) to assess the connectivity and round-trip time (RTT) between two devices on a network. Here's a step-by-step explanation of how ping works: User Initiates Ping Command : The user initiates a ping command from computer's command line or terminal. Specify the target destination by providing an IP address or domain name.
     Like  Bookmark
  • What is IPerf? iPerf is a straightforward, free, cross-platform tool widely utilized for measuring and testing network performance. Supporting various protocols such as TCP, UDP, SCTP with both IPv4 and IPv6, iPerf is compatible with multiple operating systems including Linux and Windows. Network administrators and engineers employ iPerf to diagnose network issues, optimize performance, and conduct network experiments. Additionally, iPerf is instrumental in performance testing and benchmarking of network devices. While iPerf can be employed to saturate high-speed links, it's crucial to acknowledge its resource-intensive nature, demanding substantial CPU and memory. Theoretically, iPerf could test links up to 100Gbps, but for such high speeds, using dedicated traffic generators and professional tools is often a more prudent approach. IPerf Usage An iPerf test furnishes users with crucial information primarily focused on throughput, but it goes beyond by offering insights into packet loss, jitter, and traffic distribution. Through this test, users can gain a comprehensive understanding of their network's performance characteristics. iPerf testing is a useful tool for network engineering as it allows engineers to gain a better understanding of a network’s performance characteristics. By conducting these tests, engineers can identify bottlenecks, detect network congestion, and pinpoint areas where network performance can be optimized. When network issues arise, engineers can use iPerf to isolate the problem and determine its root cause.
     Like  Bookmark
  • API Network application programming interfaces (APIs) are protocols, routines, and tools used by software developers to build applications that can communicate over a network. Similarly, a network API enables communication between the network and applications, web browsers and databases. Network APIs can be used for either obtaining network information or providing configuration instructions. An API that uses representational state transfer (REST) architecture is often recognized as a RESTful API. These APIs are commonly used in networking. RESTful APIs use HTTP methods to gather and manipulate data, while HTTP uses RESTful APIs to interact with data. API For Telecommunication Network APIs for telcos, also termed telecom APIs, facilitate the standardized interfaces between user-facing applications and complex 4G or 5G networks. These interfaces allow developers to access as well as control network resources and services such as low-latency connectivity and quality of service (QoS).Telecom APIs help developers to create cutting-edge applications and services that can enable advanced features on 4G networks, as well as implement low latency, ultra-fast data speeds and massive machine-type communication (mMTC) in the case of 5G. API Monetize Networks
     Like  Bookmark