Tag: O-RAN Alliance

CM_o_Ran

Introduction to Conflict Mitigation in O-RAN: Categorization of Conflicts

2025-03-18
This blog post introduces the topic of conflict mitigation. To mitigate conflicts properly, the advanced detection and classification conflict approach is needed. At first, we discuss possible scenarios of conflicts, between decisions from Apps located at different or the same RIC. We then zoom into the Near-RT RIC and analyze types of conflicts between xApps. Finally, we discuss the impact of conflicts on the O-RAN network.
Continue reading
synch-blog

What Time Is It? Synchronization in Telecom Networks

2024-12-20
Time synchronization has recently emerged as an important requirement in telecom networks for several reasons. It ensures that devices and systems across networks operate cohesively, which is crucial for data integrity and maintaining the quality of the service. Additionally, accurate timekeeping is vital for security protocols, as many encryption methods rely on precise timestamps.
Continue reading
the Security and Energy Efficiency Trade-Off

Navigating the Security and Energy Efficiency Trade-Off in O-RAN: Challenges and Solutions

2024-10-13
O-RAN ALLIANCE prioritizes security, with WG11 leading the development of security-focused specifications for a secure-by-design O-RAN architecture. This includes identifying threats, risks, requirements, and protocols for O-RAN components, along with test specifications. The O-RAN Security Threat Modeling and Risk Assessment report defines critical assets, threat models, and security principles. Technical reports address specific security requirements and protocols. O-RAN's ZTA ensures continuous monitoring, risk assessment, and dynamic security operations through control loops and RICs. It also supports context-aware security management for a high Quality of Security. In this blog post, we discuss the interplay between the level of cybersecurity provided by O-RAN applications and the energy cost of such security.
Continue reading
Smart RF Channel Tuning

Energy Efficiency in Open RAN with Smart RF Channel Tuning

2024-09-09
Recently, energy efficiency has been pointed out as one of the key requirements within mobile networks. The development of intelligent algorithms providing RAN with EE features is possible when having access to the KPIs, and proper control actions, e.g., cell on/off switching, or RF channel reconfiguration. These features together with a ML framework are available in the O-RAN architecture. This post provides an overview of the EE framework according to the use cases specified by the O-RAN ALLIANCE. It is followed by the implementation of the ES-rApp as per Rimedo Labs' implementation.
Continue reading
Digital Twin

Digital Twin – What Is It and How Can It Affect Future Networks

2024-08-12
The concept of the Digital Twin (DT) has been around for years, but it has recently gained increased recognition. A Digital Twin is a software-based representation of a real-world system, device, or invention, designed to mimic its real-life counterpart as closely as possible. In this blog post, we explore the concept of DT and its potential impact on future networks. We highlight the benefits of using Network Digital Twins (NDTs) and demonstrate how integrating AI and ML with DT can enhance overall network performance. Additionally, we present the O-RAN ALLIANCE's perspective on DT and discuss potential future developments in this area.
Continue reading
V2X Emergency Cybersecurity

O-RAN Hierarchical Traffic Management for an Advanced V2X Scenario Covering Emergency and Cybersecurity Services

2024-07-03
This blog details our work on extending Traffic Steering within the O-RAN framework through Hierarchical Traffic Management. We evaluate it in a challenging scenario involving a heterogeneous network with high mobility, where the behavior and service usage of UEs change significantly over time. The use case addresses dynamic network changes, including the appearance of high-priority emergency services like Emergency Special Services and First Responders and a complex denial of service cyberattack during high-demand situations.
Continue reading