Monday, September 25, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Networking

Achieving Low Latency in Different Types of Wireless Networks Requires an End-to-end Focus

Researcher by Researcher
October 20, 2022
in Networking
0
Achieving Low Latency in Different Types of Wireless Networks Requires an End-to-end Focus
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


Low latency numbers are a moving target. They’re higher for applications with low-throughput requirements than they are for applications with higher-throughput requirements. In general, latency is a function of the proper network design. Radio latency must be considered alongside end-to-end IP latency and the round-trip delay. One major factor that contributes to latency is shared by 5G, Wi-Fi, and Cisco Ultra-Reliable Wireless Backhaul (URWB) technologies: The closer applications are located to where data is being processed in data centers, clouds, or at the network edge, the lower the possible latency.

Low Latency Requirements Vary by Application

In VoIP, 150 milliseconds of latency in one direction is not noticeable by users and therefore perfectly acceptable. With collaboration applications like WebEx or Microsoft Teams and augmented and virtual reality (AR/VR), sub-50 millisecond bi-directional response times are required. If you’re using wireless connections to run an Autonomous Mobile Robot (AMR) or an Automated Guided Vehicle (AGV) in a factory, sub-20 ms response times in a high-throughput network are necessary, while some closed-loop process control traffic requires 10 ms or less end-to-end latency.

Related articles

Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services

Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services

September 22, 2023
How to Create and Use a Docker Secret From a File (+ Video)

How to Create and Use a Docker Secret From a File (+ Video)

September 20, 2023

How Latency is Usually Calculated

End-to-end IP latency is usually calculated in one direction: from the wireless device to the wireless network, IP transport network, and application server. Round-trip Time (RTT) is the calculation of bi-directional latency (e.g., the time required for a network ping). Achieving lower RTT latency is simplified with the closer proximity of applications hosting the wireless devices.

In calculating end-to-end IP latency, it’s important to consider the typical round-trip time (RTT) latency between an end user and a cloud provider or content distribution network (CDN) provider. In a network design aiming for 150 ms of RTT latency, the time split between each network segment or building block from the local device to its application must be estimated. A device attaches to a local wireless network with its over-the-air latency, then data is transited over public and private IP infrastructure, including switches, routers, and firewalls in the round-trip path. This often incurs unpredictable Internet latency before reaching the application.In addition, the processing time required before a response is sent back must also be considered in calculating overall latency.

How Different Wireless Technologies Handle Latency

Advanced types of 5G service ― like 5G Enhanced Mobile Broadband (eMBB) and 5G Ultra-Reliable Low Latency Communications (URLLC) ― include optimizations at every step of the radio hardware and uplink and downlink transmission processes. New radio features address low latency communications, allowing for a variable transmission time interval (TTI), which can scale from 1ms down to ~140 microseconds, depending on whether spectral efficiency in eMBB or low latency in URLLC is the main goal.  In a 5G network, the User Plane Function (UPF) is the interconnect point between the mobile infrastructure and the data network and gets IP packets from the radio over a tunnel.

Wi-Fi, even though it operates in unlicensed bands, is strictly regulated by countries. Local regulations define maximum power levels for access points to avoid interference between users. This in turn determines range, coverage, penetration, and signal strength. The next generation of the Wi-Fi protocol is expected to enhance its determinism, allowing better latency control in a network design.

Although Wi-Fi and 5G use different types of encapsulations, IP packets in a Wi-Fi network similarly move from access points to the wireless radio network and through tunnels to a wireless LAN controller (WLC). If low latency is required for an application, a Wi-Fi WLC for the application server path should be designed as short as possible.

With Cisco Ultra-Reliable Wireless Backhaul (Cisco URWB), a wireless WAN backhaul technology derived from Wi-Fi and designed to serve mobile network environments, provides low-latency, highly reliable, long-range, high-bandwidth connections that can handle endpoints moving at high speeds with zero-delay handoffs (like vehicles, trains, or subways). Operating in unlicensed frequencies, the Cisco URWB segment requires an appropriate design to control latency and fast handover in less than 5 ms, while the end-to-end IP infrastructure beginning at the Cisco URWB gateway is like Wi-Fi and 5G topologies.

Recent enhancements deliver uninterrupted connectivity to fast-moving devices by sending high-priority packets via redundant paths. Cisco patented Multipath Operations (MPO) technology can duplicate protected traffic up to 8x, avoid common paths, and it works alongside hardware availability for lower latency and higher availability, limiting interference and hardware failures.

Low latency means different things in different applications and requires different solutions. The right network design can reduce latency to desired targets based on your company’s strategy and use cases.

Radio latency must be estimated in the context of end-to-end IP latency and the round-trip delay. While many different factors contribute to lowering latency, with 5G, Wi-Fi, and Cisco URWB, the closer applications are to where data is being processed, whether in a data center, cloud, or network edge, the lower the probable service latency.

Read the white paper for more information:

Share:



Source link

Tags: AchievingendtoendFocusLatencyNetworksrequirestypesWireless
Share76Tweet47

Related Posts

Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services

Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services

September 22, 2023
0

The attestation service is designed to allow data in confidential computing environments to interact with AI safely, as well as...

How to Create and Use a Docker Secret From a File (+ Video)

How to Create and Use a Docker Secret From a File (+ Video)

September 20, 2023
0

In this step-by-step tutorial, learn how to create and use a Docker secret to help keep your data secure. https://www.youtube.com/watch?v=TfVCXaMRNgM...

Window Closing for Australian Businesses to Upgrade From 3G

Window Closing for Australian Businesses to Upgrade From 3G

September 13, 2023
0

Image: Jon Anders Wiken/Adobe Stock It is the end of an era. Twenty years ago, 3G wireless connectivity started rolling...

Google Cloud Next ‘23: New Generative AI-Powered Services

Google Cloud Next ‘23: New Generative AI-Powered Services

August 30, 2023
0

Image: Sundry Photography/Adobe Stock Google unveiled a wide array of new generative AI-powered services at its Google Cloud Next 2023...

Microsoft Tops List of Most-Impersonated Brands in Phishing Exploits

Microsoft Tops List of Most-Impersonated Brands in Phishing Exploits

August 29, 2023
0

Image: Timon/Adobe Stock A significant portion of social engineering attacks, such as phishing, involve cloaking a metaphorical wolf in sheep’s...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
Microsoft to Block Macros by Default in Office Apps

Qakbot Email Thread Hijacking Attacks Drop Multiple Payloads

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
‘Horse Gone Barn Bolted’ is Strong Password – Krebs on Security

‘Horse Gone Barn Bolted’ is Strong Password – Krebs on Security

September 23, 2023
SumUp Launches 7am Payouts; Offering UK Merchants Optimal Financial Flexibility

SumUp Launches 7am Payouts; Offering UK Merchants Optimal Financial Flexibility

September 23, 2023
Stealth Falcon preying over Middle Eastern skies with Deadglyph

Stealth Falcon preying over Middle Eastern skies with Deadglyph

September 23, 2023
Will you give X your biometric data? – Week in security with Tony Anscombe

ESET’s cutting-edge threat research at LABScon – Week in security with Tony Anscombe

September 23, 2023

Recent Posts

‘Horse Gone Barn Bolted’ is Strong Password – Krebs on Security

‘Horse Gone Barn Bolted’ is Strong Password – Krebs on Security

September 23, 2023
SumUp Launches 7am Payouts; Offering UK Merchants Optimal Financial Flexibility

SumUp Launches 7am Payouts; Offering UK Merchants Optimal Financial Flexibility

September 23, 2023
Stealth Falcon preying over Middle Eastern skies with Deadglyph

Stealth Falcon preying over Middle Eastern skies with Deadglyph

September 23, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • LetsAskBinuBlogs
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cyber Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved