The Study on the Encryption Technology of Black Core Network

Author(s):  
Liao Jingjing ◽  
Zhong Xiyu ◽  
Li Hanping
Keyword(s):  
2019 ◽  
Author(s):  
Rajavelsamy R ◽  
Debabrata Das

5G promises to support new level of use cases that will deliver a better user experience. The 3rd Generation Partnership Project (3GPP) [1] defined 5G system introduced fundamental changes on top of its former cellular systems in several design areas, including security. Unlike in the legacy systems, the 5G architecture design considers Home control enhancements for roaming customer, tight collaboration with the 3rd Party Application servers, Unified Authentication framework to accommodate various category of devices and services, enhanced user privacy, and secured the new service based core network architecture. Further, 3GPP is investigating the enhancements to the 5G security aspects to support longer security key lengths, False Base station detection and wireless backhaul in the Phase-2 of 5G standardization [2]. This paper provides the key enhancements specified by the 3GPP for 5G system, particularly the differences to the 4G system and the rationale behind the decisions.


Author(s):  
Yuanzhe Li ◽  
Jie Huang ◽  
Qibo Sun ◽  
Tao Sun ◽  
Shangguang Wang

2019 ◽  
Vol 0 (0) ◽  
Author(s):  
Yan Wang ◽  
Shangya Han ◽  
Panke Qin ◽  
Yaping Li ◽  
Yanmei Shen

AbstractFor the effective bearer of P2P-type services, a P2P service bearer reorientation method for passive optical network for long-distance wide access based on P2P protocol message and wire-speed message identification is proposed. However, the reorientation method still has the possibility of relocation failure, so it is modified – that is, an improved P2P service bearer reorientation method based on optical line terminal (OLT) and optical network unit (ONU) cooperation. And the tool NS2 is used for network simulation analysis. Through simulation analysis, it is verified that the modified reorientation method improves the data traffic burden at the core network and at the OLT.


2020 ◽  
Vol 0 (0) ◽  
Author(s):  
Bakhe Nleya ◽  
Philani Khumalo ◽  
Andrew Mutsvangwa

AbstractHeterogeneous IoT-enabled networks generally accommodate both jitter tolerant and intolerant traffic. Optical Burst Switched (OBS) backbone networks handle the resultant volumes of such traffic by transmitting it in huge size chunks called bursts. Because of the lack of or limited buffering capabilities within the core network, burst contentions may frequently occur and thus affect overall supportable quality of service (QoS). Burst contention(s) in the core network is generally characterized by frequent burst losses as well as differential delays especially when traffic levels surge. Burst contention can be resolved in the core network by way of partial buffering using fiber delay lines (FDLs), wavelength conversion using wavelength converters (WCs) or deflection routing. In this paper, we assume that burst contention is resolved by way of deflecting contending bursts to other less congested paths even though this may lead to differential delays incurred by bursts as they traverse the network. This will contribute to undesirable jitter that may ultimately compromise overall QoS. Noting that jitter is mostly caused by deflection routing which itself is a result of poor wavelength and routing assigning, the paper proposes a controlled deflection routing (CDR) and wavelength assignment based scheme that allows the deflection of bursts to alternate paths only after controller buffer preset thresholds are surpassed. In this way, bursts (or burst fragments) intended for a common destination are always most likely to be routed on the same or least cost path end-to-end. We describe the scheme as well as compare its performance to other existing approaches. Overall, both analytical and simulation results show that the proposed scheme does lower both congestion (on deflection routes) as well as jitter, thus also improving throughput as well as avoiding congestion on deflection paths.


2021 ◽  
pp. 0271678X2110029
Author(s):  
Mitsouko van Assche ◽  
Elisabeth Dirren ◽  
Alexia Bourgeois ◽  
Andreas Kleinschmidt ◽  
Jonas Richiardi ◽  
...  

After stroke restricted to the primary motor cortex (M1), it is uncertain whether network reorganization associated with recovery involves the periinfarct or more remote regions. We studied 16 patients with focal M1 stroke and hand paresis. Motor function and resting-state MRI functional connectivity (FC) were assessed at three time points: acute (<10 days), early subacute (3 weeks), and late subacute (3 months). FC correlates of recovery were investigated at three spatial scales, (i) ipsilesional non-infarcted M1, (ii) core motor network (M1, premotor cortex (PMC), supplementary motor area (SMA), and primary somatosensory cortex), and (iii) extended motor network including all regions structurally connected to the upper limb representation of M1. Hand dexterity was impaired only in the acute phase ( P = 0.036). At a small spatial scale, clinical recovery was more frequently associated with connections involving ipsilesional non-infarcted M1 (Odds Ratio = 6.29; P = 0.036). At a larger scale, recovery correlated with increased FC strength in the core network compared to the extended motor network (rho = 0.71; P = 0.006). These results suggest that FC changes associated with motor improvement involve the perilesional M1 and do not extend beyond the core motor network. Core motor regions, and more specifically ipsilesional non-infarcted M1, could hence become primary targets for restorative therapies.


Sensors ◽  
2019 ◽  
Vol 19 (6) ◽  
pp. 1339 ◽  
Author(s):  
Hasan Islam ◽  
Dmitrij Lagutin ◽  
Antti Ylä-Jääski ◽  
Nikos Fotiou ◽  
Andrei Gurtov

The Constrained Application Protocol (CoAP) is a specialized web transfer protocol which is intended to be used for constrained networks and devices. CoAP and its extensions (e.g., CoAP observe and group communication) provide the potential for developing novel applications in the Internet-of-Things (IoT). However, a full-fledged CoAP-based application may require significant computing capability, power, and storage capacity in IoT devices. To address these challenges, we present the design, implementation, and experimentation with the CoAP handler which provides transparent CoAP services through the ICN core network. In addition, we demonstrate how the CoAP traffic over an ICN network can unleash the full potential of the CoAP, shifting both overhead and complexity from the (constrained) endpoints to the ICN network. The experiments prove that the CoAP Handler helps to decrease the required computation complexity, communication overhead, and state management of the CoAP server.


Author(s):  
Praveen Salihundam ◽  
Mohammed Asadullah Khan ◽  
Shailendra Jain ◽  
Yatin Hoskote ◽  
Satish Yada ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document