219 research outputs found

    SECURITY MEASUREMENT FOR LTE/SAE NETWORK DURING SINGLE RADIO VOICE CALL CONTINUITY (SRVCC).

    Get PDF
    Voice has significant place in mobile communication networks. Though data applications have extensively gained in importance over the years but voice is still a major source of revenue for mobile operators. It is obvious that voice will remain an important application even in the era of Long Term Evolution (LTE). Basically LTE is an all-IP data-only transport technology using packet switching. Therefore, it introduces challenges to satisfy quality of service expectations for circuit-switched mobile telephony and SMS for LTE capable smartphones, while being served on the LTE network. Since 2013, mobile operators have been busy deploying Voice Over LTE (VoLTE). They are relying on a VoLTE technology called Single Radio Voice Call Continuity (SRVCC) for seamless handover between packet-switch domain to circuit-switch domain or vice versa. The aim of thesis is to review and identify the security measurement during SRVCC and verify test data for ciphering and integrity algorithm.fi=Opinnäytetyö kokotekstinä PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=Lärdomsprov tillgängligt som fulltext i PDF-format

    SECURITY MEASUREMENT FOR LTE/SAE NETWORK DURING SINGLE RADIO VOICE CALL CONTINUITY (SRVCC).

    Get PDF
    Voice has significant place in mobile communication networks. Though data applications have extensively gained in importance over the years but voice is still a major source of revenue for mobile operators. It is obvious that voice will remain an important application even in the era of Long Term Evolution (LTE). Basically LTE is an all-IP data-only transport technology using packet switching. Therefore, it introduces challenges to satisfy quality of service expectations for circuit-switched mobile telephony and SMS for LTE capable smartphones, while being served on the LTE network. Since 2013, mobile operators have been busy deploying Voice Over LTE (VoLTE). They are relying on a VoLTE technology called Single Radio Voice Call Continuity (SRVCC) for seamless handover between packet-switch domain to circuit-switch domain or vice versa. The aim of thesis is to review and identify the security measurement during SRVCC and verify test data for ciphering and integrity algorithm.fi=Opinnäytetyö kokotekstinä PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=Lärdomsprov tillgängligt som fulltext i PDF-format

    Method Of LTE Functional Units Organization With Evolved Packet Core Virtualizetion

    Get PDF
    Today LTE functional units are implemented on software and hardware that limits its scalability. Moreover, all information flows tied to the network operator topology to sites where are special network equipment for traffic counting and to monitor QoS. The usage of network functions virtualization can help to replace a specialized network device on the software that runs on general-purpose processors. Thus, it can reduce costs through the application of ready-made servers for the implementation of new network functionality. In the article the method of distribution of EPC functions between the active network equipment and cloud infrastructure, which is used for computation. Also algorithm of interaction of network elements at client connects to the network is proposed. This will increase the flexibility and productivity of the process provision services mobile broadband

    Telecommunications Networks

    Get PDF
    This book guides readers through the basics of rapidly emerging networks to more advanced concepts and future expectations of Telecommunications Networks. It identifies and examines the most pressing research issues in Telecommunications and it contains chapters written by leading researchers, academics and industry professionals. Telecommunications Networks - Current Status and Future Trends covers surveys of recent publications that investigate key areas of interest such as: IMS, eTOM, 3G/4G, optimization problems, modeling, simulation, quality of service, etc. This book, that is suitable for both PhD and master students, is organized into six sections: New Generation Networks, Quality of Services, Sensor Networks, Telecommunications, Traffic Engineering and Routing

    VoLTE: Fundamentals and Investment under Uncertainty by analogy with the Real Options Theory – A real case application in Greek Telecommunications market

    Get PDF
    Με την εμφάνιση των Τηλεπικοινωνιών, η φωνή έσπασε όλα τα φυσικά όρια και έγινε πραγματικότητα η μετάδοσή της παγκοσμίως σε πραγματικό χρόνο. Σύντομα, οι υπηρεσίες φωνής μετατράπηκαν σε βασική δραστηριότητα για τους παρόχους και το έναυσμα για την ανάπτυξη των Σταθερών και Κινητών Τηλεπικοινωνιών. Η τελευταία λέξη της τεχνολογίας για την Κινητή μετάδοση φωνής είναι το Voice over LTE (VoLTE), το οποίο αποτελεί μια σημαντική δυνατότητα του δικτύου για τη ουσιαστική βελτίωση της απόδοσης της φωνής και της χωρητικότητας του ραδιοδικτύου με ταυτόχρονη μείωση στα λειτουργικά κόστη. Στην παρούσα διπλωματική εργασία παρουσιάζονται οι βασικές αρχές της αρχιτεκτονικής VoLTE και παρέχεται μία ανάλυση της τεχνολογίας VoLTE ως επενδυτική ευκαιρία. Στο πρώτο μέρος παρατίθεται μια ιστορική αναδρομή σχετικά με την εξέλιξη των συστημάτων φωνής των Κινητής Τηλεπικοινωνιών από την πρώτη γενιά έως σήμερα. Περιλαμβάνεται μια επισκόπηση της αρχιτεκτονικής VoLTE με ανάλυση των κύριων υποσυστημάτων και των βασικών τους στοιχείων με βάση τις τεχνικές προδιαγραφές. Επιπλέον, παρουσιάζονται οι βασικές λειτουργίες μετάδοσης φωνής μέσω της τεχνολογίας VoLTE. Στο επόμενο μέρος περιγράφονται τα οφέλη και οι προκλήσεις που γεννιούνται από την ανάπτυξη της λύσης VoLTE, από τεχνικής άποψης αλλά και από πλευράς αγοράς. Για τον μετριασμό των κινδύνων, προτείνεται από τις χρηματοπιστωτικές αγορές η θεωρία των για την αξιολόγηση της επένδυσης, με βάση τη σύγχρονη βιβλιογραφία. Η ζήτηση της υπηρεσίας VoLTE μοντελοποιείται χρησιμοποιώντας τη γεωμετρική κίνηση Brown και αναπτύσσεται μια μεθοδολογία βασισμένη στα πραγματικά δικαιώματα προαίρεσης μέσω του δυναμικού προγραμματισμού, για τον υπολογισμό των βέλτιστων επενδυτικών κανόνων και του κόστους ευκαιρίας. Στο έκτο κεφάλαιο, παρουσιάζεται ένα παράδειγμα πραγματικής περίπτωσης επένδυσης VoLTE στην ελληνική αγορά Κινητών Τηλεπικοινωνιών, χρησιμοποιώντας την προτεινόμενη μεθοδολογία των πραγματικών δικαιωμάτων προαίρεσης. Τα αποτελέσματα συγκρίνονται με την παραδοσιακή προσέγγιση και αναλύονται με την χρήση προσομοιώσεων Monte Carlo. Συμπεράσματα και ενδιαφέροντα ευρήματα παρέχονται στο τελευταίο κεφάλαιο.With the emergence of Telecommunications, the voice broke all physical borders and could be transferred worldwide in real-time. Soon, voice services became a core business for the providers and the trigger for the development of Fixed and Mobile Telecommunications. The state of the art for mobile voice delivery is Voice over LTE (VoLTE), which is an important network capability to significantly improve the service performance and radio capacity while reducing operating costs. This study thesis presents the fundamental principles of VoLTE architecture and provides an analysis of the VoLTE solution as an investment opportunity. In the first part, a historical review is given regarding the evolution of the Cellular Mobile Telecommunication systems since their first generation. An overview of the VoLTE architecture is included with an analysis of the main subsystems and the core components based on the technical specifications. Moreover, the basic functionalities of the VoLTE technology are presented. The next part describes the benefits and challenges of deploying the VoLTE solution from technical and market perspectives. In order to mitigate the risks, the Real Options theory from the financial market is introduced for evaluating the VoLTE investment according to modern literature. The VoLTE demand is modelled using the Geometric Brownian Motion process and the dynamic programming is used to structure a Real Options-based framework for calculating optimal investment rules and opportunity cost. In the sixth chapter, a real case application of the proposed framework in the Greek Mobile Telecommunications market is presented. The results are compared with the traditional tools and analyzed by performing Monte Carlo simulations. Conclusions and interesting insights are provided in the last chapter

    Security Policy Management for a Cooperative Firewall

    Get PDF
    Increasing popularity of the Internet service and increased number of connected devices along with the introduction of IoT are making the society ever more dependent on the Internet services availability. Therefore, we need to ensure the minimum level of security and reliability of services. Ultra-Reliable Communication (URC) refers to the availability of life and business critical services nearly 100 percent of the time. These requirements are an integral part of upcoming 5th generation (5G) mobile networks. 5G is the future mobile network, which at the same time is part of the future Internet. As an extension to the conventional communication architecture, 5G needs to provide ultra-high reliability of services where; it needs to perform better than the currently available solutions in terms of security, confidentiality, integrity and reliability and it should mitigate the risks of Internet attack and malicious activities. To achieve such requirements, Customer Edge Switching (CES) architecture is presented. It proposes that the Internet user’s agent in the network provider needs to have prior information about the expected traffic of users to mitigate maximum attacks and only allow expected communication between hosts. CES executes communication security policies of each user or device acting as the user’s agent. The policy describes with fine granularity what traffic is expected by the device. The policies are sourced as automatically as possible but can also be modified by the user. Stored policies will follow the mobile user and will be executed at the network edge node executing Customer Edge Switch functions to stop all unexpected traffic from entering the mobile network. State-of-the-art in mobile network architectures utilizes the Quality of Service (QoS) policies of users. This thesis motivates the extension of current architecture to accommodate security and communication policy of end-users. The thesis presents an experimental implementation of a policy management system which is termed as Security Policy Management (SPM) to handle above-mentioned policies of users. We describe the architecture, implementation and integration of SPM with the Customer Edge Switching. Additionally, SPM has been evaluated in terms of performance, scalability, reliability and security offered via 5G customer edge nodes. Finally, the system has been analyzed for feasibility in the 5G architecture
    corecore