414 research outputs found

    On the security of software-defined next-generation cellular networks

    Get PDF
    In the recent years, mobile cellular networks are ndergoing fundamental changes and many established concepts are being revisited. Future 5G network architectures will be designed to employ a wide range of new and emerging technologies such as Software Defined Networking (SDN) and Network Functions Virtualization (NFV). These create new virtual network elements each affecting the logic of the network management and operation, enabling the creation of new generation services with substantially higher data rates and lower delays. However, new security challenges and threats are also introduced. Current Long-Term Evolution (LTE) networks are not able to accommodate these new trends in a secure and reliable way. At the same time, novel 5G systems have proffered invaluable opportunities of developing novel solutions for attack prevention, management, and recovery. In this paper, first we discuss the main security threats and possible attack vectors in cellular networks. Second, driven by the emerging next-generation cellular networks, we discuss the architectural and functional requirements to enable appropriate levels of security

    Review on Network Function Virtualization in Information-Centric Networking

    Get PDF
    Network function virtualization (NFV / VNF) and information-centric networking (ICN) are two trending technologies that have attracted expert's attention. NFV is a technique in which network functions (NF) are decoupling from commodity hardware to run on to create virtual communication services. The virtualized class nodes can bring several advantages such as reduce Operating Expenses (OPEX) and Capital Expenses (CAPEX). On the other hand, ICN is a technique that breaks the host-centric paradigm and shifts the focus to 'named information' or content-centric. ICN provides highly efficient content retrieval network architecture where popular contents are cached to minimize duplicate transmissions and allow mobile users to access popular contents from caches of network gateways. This paper investigates the implementation of NFV in ICN. Besides, reviewing and discussing the weaknesses and strengths of each architecture in a critical analysis manner of both network architectures. Eventually, highlighted the current issues and future challenges of both architectures. © 2021 IEEE

    Pilvipohjaisen radioliityntäverkon kustannusten mallintaminen

    Get PDF
    The rapid growth of mobile data traffic is challenging the current way of building and operating the current radio access network. Cloud-based radio access network is researched as a solution to provide the required capacity for rapidly growing traffic demand in more economical manner. Scope of this thesis is to evaluate the costs of different existing and future radio access network architectures depending on the given network and traffic scenario. This is done by creating a cost model based on expert interviews to solve the most economical solution for the given network in terms of total cost of ownership. The results show that the cloud-based radio access network’s cost benefits are dependent on the expected traffic growth. In the low traffic growth scenario, the cost benefits of cloud-based radio access network are questionable, but in the high traffic growth scenario clear cost benefits are achieved.Mobiilidataliikenteen nopea kasvu haastaa nykyisen tavan rakentaa ja hallinnoida tämän hetkisiä radioliityntäverkkoja. Pilvipohjaista radioliityntäverkkoa tutkitaan ratkaisuksi tarjota tarvittavaa verkkokapasiteettia entistä taloudellisemmin. Tämän opinnäytetyön tarkoituksena on arvioida nykyisten ja pilvipohjaisten radioliityntäverkkoarkkitehtuurien kustannuksia riippuen verkon rakenteesta ja liikenteestä. Tämä toteutetaan luomalla kustannusmalli, joka perustuu asiantuntijoiden haastatteluihin. Mallin avulla on mahdollista vertailla annetun verkon eri arkkitehtuurien kokonaiskustannuksia ja selvittää taloudellisin radioliityntäverkkoarkkitehtuuri verkolle. Mallinnuksen tulokset osoittavat, että pilvipohjaisen radioliityntäverkon taloudelliset hyödyt ovat riippuvaisia dataliikenteen kasvusta verkossa. Vähäisellä data-liikenteen kasvulla pilvipohjaisen radioliityntäverkon kustannusedut ovat kyseenalaiset, mutta suurella dataliikenteen kasvulla saadaan selviä säästöjä verrattuna nykyisiin arkkitehtuureihin

    Cloud RAN for Mobile Networks - a Technology Overview

    Get PDF
    Cloud Radio Access Network (C-RAN) is a novel mobile network architecture which can address a number of challenges the operators face while trying to support growing end-user’s needs. The main idea behind C-RAN is to pool the Baseband Units (BBUs) from multiple base stations into centralized BBU Pool for statistical multiplexing gain, while shifting the burden to the high-speed wireline transmission of In-phase and Quadrature (IQ) data. C-RAN enables energy efficient network operation and possible cost savings on base- band resources. Furthermore, it improves network capacity by performing load balancing and cooperative processing of signals originating from several base stations. This article surveys the state-of-the-art literature on C-RAN. It can serve as a starting point for anyone willing to understand C-RAN architecture and advance the research on C-RA

    Algorithms for advance bandwidth reservation in media production networks

    Get PDF
    Media production generally requires many geographically distributed actors (e.g., production houses, broadcasters, advertisers) to exchange huge amounts of raw video and audio data. Traditional distribution techniques, such as dedicated point-to-point optical links, are highly inefficient in terms of installation time and cost. To improve efficiency, shared media production networks that connect all involved actors over a large geographical area, are currently being deployed. The traffic in such networks is often predictable, as the timing and bandwidth requirements of data transfers are generally known hours or even days in advance. As such, the use of advance bandwidth reservation (AR) can greatly increase resource utilization and cost efficiency. In this paper, we propose an Integer Linear Programming formulation of the bandwidth scheduling problem, which takes into account the specific characteristics of media production networks, is presented. Two novel optimization algorithms based on this model are thoroughly evaluated and compared by means of in-depth simulation results

    A Highly Scalable IoT Architecture through Network Function Virtualization

    Get PDF
    As the number of devices for Internet of Things (IoT) is rapidly growing, existing communication infrastructures are forced to continually evolve. The next generation network infrastructure is expected to be virtualized and able to integrate different kinds of information technology resources. Network Functions Virtualization (NFV) is one of the leading concepts facilitating the operation of network services in a scalable manner. In this paper, we present an architecture involving NFV to meet the requirements of highly scalable IoT scenarios. We highlight the benefits and challenges of our approach for IoT stakeholders. Finally, the paper illustrates our vision of how the proposed architecture can be applied in the context of a state-of-the-art high-tech operating room, which we are going to realize in future work

    Virtualization and shared Infrastructure data storage for IT in Kosovo institutions

    Get PDF
    This capstone project addressed the need to strengthen the centralization and security of the electronic data from various national institutions in Kosovo. Most of the electronic data in Kosovo Institutions are separated in so many server rooms in different institutions and different locations. The Republic of Kosovo institutions have different systems of data stored in different physical spaces. Most of these data should be exchangeable in different systems and different data bases. The country lacks physical security in the current system of data security and professional staff for maintaining such data (databases, applications, and other electronic data). The budget of Kosovo is making higher and unnecessary expenditure in the field of information and technology. This project would be a good alternative in order to reduce budgetary expenditure of Kosovo ... The outcome of this project provides recommendations in order to achieve the goals of the project. The three main recommendations of the project are centralization, virtualization and business continuity

    Design of an Integrated SDN/NFV management and orchestration architecture

    Get PDF
    This project aims at explaining and defining the SDN technology with integration of the NFV technology. We will also see the logic of this technology applied to a program designed for this project. The objective of this project is to understand the purpose of this technology, where is it going to be used, why companies like Google or Microsoft for over 2 years have been investing time and resources to develop and to implement the technology on the corporate level, as well as on the level of regular user like you and me. Firstly we will focus on the explanation of the SDN technology, what it is, what for is it going to be used and what is the future of this technology. Why the SDN is so important? Next, we will explain the use of the NFV and show how it is going to change the way we see the network right now. NFV also works with the SDN. Once we define the basics of the two technologies, we will proceed to the explanation of the practical part of this project. I would like to comment on the software used for this project is open source, since the OS used on the machine that carried out the simulations, and wrote this lines, to the package Rstudio. The practical part is to simulate how will work the network flows when this technology is used. The program will optimize the resources that we want for the proper performance of the global system. For example, we can optimize the path, the number of machines the flow has to cross, optimize the global delay of the flow, etc. Finally, we will reach specific conclusions based on the work we have done, as well as some personal outcome, such as the analysis of the difficulties encountered during the performance, as well as training and finally knowledge gained through work
    • …
    corecore