Skip navigation
C++ Projects

C++ Projects

Radio Access Network Services

In our department, we create systems that control traffic in telecommunications networks. You might ask: what is it about? Let us explain!

Surely, you use your phone while travelling: you talk on the phone and use streaming services (Netflix, YouTube, etc.). Meanwhile, the views outside the window and the images on your phone are not the only things that change.

During such a journey, the mobile network coverage changes many times, and you and your smartphone use the signal emitted by subsequent transmitters. Without proper communication between transmitters scattered around the world, phone calls or data streaming during your travels would not be possible. Here is where Ericsson and our engineer's creativity steps in!

The solutions and projects developed in our department allow for communication between transmitters, enabling the use of telecommunications services when moving over long distances, ensuring a sufficiently high data transfer, and handling multiple connections, depending on the users’ needs.

We are currently working on developing something called Inter-RAT Handover using the 5G network. Another peculiar term straight from Telco? It's true, we have a lot of them, but the devil is not as scary as they paint him. Moving on to the specifics - Inter-RAT handover is a functionality that allows you to transfer users between transmitters based on the information exchanged between them, depending on the user's needs and network capabilities.

If the transmitters could talk, we could eavesdrop on a conversation like this:

  • I have a problem, a lot of people are watching ski jumping and I'm running out of resources to make voice calls. How is your situation, can you help?
  • It seems that I still have some capacity, let's transfer them to me!

If you would like to learn the "language of transmitters" and develop it together with us – you are most welcome!

Radio Access Network Services
What we work in:
  • C++17
  • Google Testing Framework
  • Jenkins
  • Gcov
  • Valgrind
How we work:
  • Scrum
  • 7-8 people XFTs
  • Elastic hybrid work

Developer flow services

In our department, we build simulations of authentic cellular networks to test new 5G mobile technologies and demanding scenarios that allow us to explore the possibilities of overloaded networks.

At a concert, in a large hall, or in a crowded city center, have you ever wondered how it is possible that thousands of people, just like you, are using their cell phones at the same time and place to talk, send photos, and record videos? What would happen if we suddenly doubled the number of people using phones in the same location? These are the questions we seek to answer as we push the boundaries of telecommunications.

In our daily work, we create our own virtual world in which we simulate various scenarios, break through today's telecommunications limitations, and turn them into tomorrow's norms and everyday practices. The simulators we build test how the network and phone connections behave in numerous acute situations. Thanks to the solutions we introduce, we investigate how much we can increase the number of users in a given area, how to maintain the quality of multiple connections, and how to keep high levels of data transfer. Thus, terms such as "capacity," "robustness," and "resiliency" are our bread and butter!

Hence, if you find yourself in crowded places and observe incoming users using their phones, you can be sure we have anticipated this situation in our work: we have examined the network's capacity (capacity), tested how long the network can withstand sudden changes without degrading the signal and connection (robustness), and how quickly it can return to a state of high performance in case unexpected factors interrupt its operation (resiliency).

If you want to push the limits of technology with us, join us and help us connect people more effectively!

dps
What we work in:
  • Java
  • C++
  • Erlang
  • Ruby
  • Bash
  • Jenkins, GiT, Linux
How we work:
  • Scrum
  • Elasric hybrid work
  • 7-8 people teams

CSI RAN Transport Interconnect

In our department, we deal with maintaining and developing the functionality of the Radio Access Network, especially those related to data stream termination at the base station (RBS), routing and switching.

Alright, but what does that actually mean? Let us explain!

With the ever-growing popularity of mobile devices, the amount of data transmitted through the access network is constantly increasing. Whether you are having a business video call, watching your favourite TV show, or playing an engaging online game, you are generating and receiving data that must be reliably, quickly, and securely transmitted to the recipient. Seemingly simple, but in practice, each of these cases generates slightly different requirements and requires special handling.

 

For example, an audio conversation generates a relatively small amount of data, nonetheless, a guarantee of a stable connection is crucial. A buffered TV show or movie involves a lot of data, but delivery can be temporarily slowed down or even interrupted. Online gaming has even more stringent latency requirements than an audio conversation. Yet, in the face of data overload, should the continuity of gameplay or maintaining the 4K quality of the TV show take priority over an important audio call? Definitely not.

 

Here's where QoS (Quality of Service) functionalities come to the rescue, and they are, among others, taken care of in our department! QoS mechanisms are based on frame and packet priority tags and ensure proper handling, especially in the event of overload. And all of this happens in the blink of an eye, with "five nines" stability typical for the telco standard (99.99999% of the time for reliable operation).

If you could "eavesdrop" on the operation of our software, you might hear something like this:

  • Zbyszek, queue number five is full while data is constantly flowing in! That's the one with the movies and TV shows.
  • Thanks, Radek, for the information! Start rejecting packets that you won't be able to send in 6 milliseconds. We now need to give priority to the first three queues. We have plenty of connections there, including emergency ones.

Learn the secrets of Quality of Service, secure IPSec protocol connections or various other functionalities! Join us and learn from the best! Welcome!

CSI
What we work in:
  • C++
  • C
  • Java (Junit extension)
  • Git/gerrit
  • Linux
How we work:
  • Scrum
  • 6-8 person XFT
  • Elastic hybrid work
  • International cooperation
  • OOO based programming

CSI RAN Transport Interconnect IPSec version

In our department, we focus on maintaining and developing Radio Access Network functionalities, particularly those related to data stream termination at the base station (RBS), security, routing, and switching.

But what does that actually mean? Let us explain!

With the skyrocketing popularity of mobile devices, the amount of data transmitted through the access network is rapidly increasing. This growth is further challenged by the complex geopolitical situation worldwide. As a result, the requirements for transmission devices are evolving. In short- it needs to be faster and more secure!

An example of a protocol ensuring secure data transmission is the IPSec protocol. In our department we work on its integration and development, same as we do for various other functionalities. The operation of IPSec protocol relies on transmitting encrypted data over the so-called 'untrusted network.' Despite the common association of mobile devices primarily with wireless transmission between telecom towers, in practice, a significant portion of the standard data path between end devices goes through shared and leased network segments, including the ubiquitous Internet. It is precisely this 'shared' route that often represents the 'untrusted network'.

The software we continuously improve enhances, among others, devices that serve as IPSec encryption machines. Positioned at the edges of the 'untrusted network,' before securely transmitting data, they again, in an especially secure manner- exchange information about encryption algorithms - and verify each other’s identities.

If you could 'eavesdrop' on the operation of our software, you might hear something like this:

Hi, Zbyszek, this is Kasia speaking. Here's my encryption key and certificate. I support the following encryption algorithms...

Hi, Kasia! I'm sending the same set of information from my side. Let's choose the safest algorithm known to both of us!

Discover the secrets of secure IPSec connections, Quality of Service mechanisms, and countless intricacies of networks, including 5G! Join us and learn among the best!

csi ran
What we work in:
  • C++
  • C
  • Java (JUnit development)
  • Git/gerrit
  • Linux
How we work:
  • Scrum
  • 6-8 person cross-functional teams (XFT)
  • Flexible hybrid work
  • International collaboration
  • Programming principles based on open standards

Cloud Native Development 5G

In our team, we are working on ensuring the compatibility of our product - a 5G network component responsible for connecting the cellular network to the internet - with any Cloud Native solution compliant with the 3GPP standard.

You use the internet on your phone every day, but have you already started using the 5G network? If so, our product enables you to watch YouTube videos, read news, receive emails, or perform other online activities. By utilizing cloud-based infrastructure, our teams ensure that the product meets all security requirements, is stable, and always operates flawlessly.

We are implementing projects that focus on transferring hardware-dedicated products to the cloud environment. An example is the integration of AppArmor profiles into our microservices, which reduces potential attacks and ensures a high level of protection against viruses or hacking attacks. Such a solution helps operators of your cellular network maintain a secure internet connection.

Think back to the days when people sat at telephone switchboard, rearranging cables to enable long-distance calls. At that time, due to technical limitations, little attention was paid to security. Few people were bothered that the switchboard operators could listen in on their conversations.

Imagine that today, someone could connect to a telecommunications cabinet and track your online activities or eavesdrop on your conversations. Although today's telephone exchanges are based on the latest technologies, our team is constantly working to ensure that your connections and online activity are protected against attacks, using Cloud Native technologies. Therefore, it is worth using our Packet Core product to be sure that the latest technologies are watching over your online security.

If "security" and "cloud solutions in telecommunications" sound interesting to you, check out the open roles offered by Ericsson.

CND
What we work in:
  • Kubernetes
  • Bash & Linux
  • Docker
  • Helm
  • C++17 & GoLang
How we work:
  • Scrum
  • Elastic hybrid work

CSI Smart Connected Site

Our Product Engineering Group Infra SW Pol is one of the main research and development units in the domain of radio access networks for Ericsson.

Telecommunication networks are often associated with huge masts and antennas (called "Sitem") placed on tall buildings, occupying a lot of space. With 5G technology, solutions are evolving towards greater automation and less interference with the landscape.

The current market needs of operators indicate the necessity to develop Ericsson Smart Connected Site solutions, in order to save energy and have the ability to use different power sources. In response to these needs alternative power sources such as solar and wind energy or diesel generators are being implemented. There is a growing need for flexible and efficient solutions that are easy to deploy and maintain, which could also significantly reduce costly on-site visits. Furthermore, there is pressure to reduce the Site's footprint while tightening requirements for acquiring locations in an already crowded landscape.

One of our main products, Ericsson Smart Connected Site, developed in Krakow, is a comprehensive solution aimed at intelligently integrating the management of all infrastructure elements in a unified system, allowing to reduce the operational costs of the mobile operator. This way, we make telecommunication products evolve towards balanced energy consumption and reduced space requirements.

Specifically, our software for Controller 6610* allows the operator to remotely, easily and conveniently supervise, preview, and take actions on equipment located in various locations in the field without the need to send technicians. What is more, Controller 6610 enables automated data collection and analysis at the network level, which can be visualized digitally on various devices - on the operator's office computer or on a tablet, smartphone, or laptop in the field. Thanks to this solution, operators use a more intelligent facility management system, providing 24/7 information on network availability, capacity, performance, energy management, and unprecedented control over network stability.

The current market needs of operators indicate the necessity to develop Ericsson Smart Connected Site solutions, in order to save energy and have the ability to use different power sources. In response to these needs alternative power sources such as solar and wind energy or diesel generators are being implemented. There is a growing need for flexible and efficient solutions that are easy to deploy and maintain, which could also significantly reduce costly on-site visits. Furthermore, there is pressure to reduce the Site's footprint while tightening requirements for acquiring locations in an already crowded landscape.

One of our main products, Ericsson Smart Connected Site, developed in Krakow, is a comprehensive solution aimed at intelligently integrating the management of all infrastructure elements in a unified system, allowing to reduce the operational costs of the mobile operator. This way, we make telecommunication products evolve towards balanced energy consumption and reduced space requirements.

Specifically, our software for Controller 6610* allows the operator to remotely, easily and conveniently supervise, preview, and take actions on equipment located in various locations in the field without the need to send technicians. What is more, Controller 6610 enables automated data collection and analysis at the network level, which can be visualized digitally on various devices - on the operator's office computer or on a tablet, smartphone, or laptop in the field. Thanks to this solution, operators use a more intelligent facility management system, providing 24/7 information on network availability, capacity, performance, energy management, and unprecedented control over network stability.

If you want to build modern telecommunication solutions, gain experience and develop your skills, join us!

CSI
What we work with:
  • C++20
  • Google Test Framework
  • JAVA and Erlang to a lesser extent for writing tests
  • Git
  • Linux
How we work:
  • Scrum
  • SAFe
  • 6-7 person teams
  • International projects
  • Flexible hybrid work