6,463 research outputs found
3GPP Long Term Evolution: Architecture, Protocols and Interfaces
The evolution of wireless networks is a continuous phenomenon. Some key trends in this changing process include:
reduced latency, increased performance with substantial reduction in costs, and seamless mobility. Long Term Evolution
(LTE) is based on an evolved architecture that makes it a candidate of choice for next generation wireless mobile networks.
This paper provides an overview of both the core and access networks of LTE. Functional details of the associated
protocols and interfaces are also presented
Wireless Broadband Access: Policy Implications of Heterogeneous Networks
A wireless heterogeneous network can help increase the access transmission speed and contribute thereby to the broadband deployment policies of administrations and telecommunications operators. Given the technical particularities of wireless heterogeneous networks, the deployment of wireless heterogeneous networks raises a number of challenges that need to be addressed by regulatory authorities. This article analyses the following regulatory implications: standardisation and technology neutrality, spectrum management, market analysis, open access and infrastructure sharing, interconnection pricing and charging, broadband deployment policies, and privacy and security issues. --4G,heterogeneous networks,cooperative networks,spectrum management,regulation,wireless networks
Signaling Security in LTE Roaming
LTE (Long Term Evolution) also known as 4G, is highly in demand for its incomparable levels of experience like high data rates, low latency, good Quality of Services(QoS) and roaming features. LTE uses Diameter protocol, which makes LTE an all IP network, connecting multiple network providers, providing flexibility in adding nodes and flexible mobility management while roaming. Which in turn makes LTE network more vulnerable to malicious actors. Diameter protocol architecture includes many nodes and the communication between the nodes is done through request and answer messages. Diameter manages the control session. Control session includes the signaling traffic which consists of messages to manage the user session. Roaming signaling traffic arises due to subscribers movement out of the geographical range of their home network to any other network. This signaling traffic moves over the roaming interconnection called S9 roaming interface.
This thesis project aims to interfere and manipulate traffic from both user-to-network and network-to-network interfaces in order to identify possible security vulnerabilities in LTE roaming. A fake base-station is installed to establish a connection to a subscriber through the air interface. The IMSI (International Mobile Subscription Identity) is captured using this fake station. To explore the network-to-network communication an emulator based LTE testbed is used. The author has investigated how Diameter messages can be manipulated over the S9 interface to perform a fraud or DoS attack using the IMSI number. The consequences of such attacks are discussed and the countermeasures that can be considered by the MNOs (Mobile Network Operators) and Standardization Committees
Design Concept for a Failover Mechanism in Distributed SDN Controllers
Software defined networking allows the separation of the control plane and data plane in networking. It provides scalability, programmability, and centralized control. It will use these traits to reach ubiquitous connectivity. Like all concepts software defined networking does not offer these advantages without a cost. By utilizing a centralized controller, a single point of failure is created. To address this issue, this paper proposes a distributed controller failover. This failover will provide a mechanism for recovery when controllers are not located in the same location. This failover mechanism is based on number of hops from orphan nodes to the controller in addition to the link connection. This mechanism was simulated in Long Term Evolution telecommunications architecture
Random Linear Network Coding for 5G Mobile Video Delivery
An exponential increase in mobile video delivery will continue with the
demand for higher resolution, multi-view and large-scale multicast video
services. Novel fifth generation (5G) 3GPP New Radio (NR) standard will bring a
number of new opportunities for optimizing video delivery across both 5G core
and radio access networks. One of the promising approaches for video quality
adaptation, throughput enhancement and erasure protection is the use of
packet-level random linear network coding (RLNC). In this review paper, we
discuss the integration of RLNC into the 5G NR standard, building upon the
ideas and opportunities identified in 4G LTE. We explicitly identify and
discuss in detail novel 5G NR features that provide support for RLNC-based
video delivery in 5G, thus pointing out to the promising avenues for future
research.Comment: Invited paper for Special Issue "Network and Rateless Coding for
Video Streaming" - MDPI Informatio
Method Of LTE Functional Units Organization With Evolved Packet Core Virtualizetion
Today LTE functional units are implemented on software and hardware that limits its scalability. Moreover, all information flows tied to the network operator topology to sites where are special network equipment for traffic counting and to monitor QoS. The usage of network functions virtualization can help to replace a specialized network device on the software that runs on general-purpose processors. Thus, it can reduce costs through the application of ready-made servers for the implementation of new network functionality. In the article the method of distribution of EPC functions between the active network equipment and cloud infrastructure, which is used for computation. Also algorithm of interaction of network elements at client connects to the network is proposed. This will increase the flexibility and productivity of the process provision services mobile broadband
- β¦