scholarly journals An End-to-End Automation Framework for Mobile Network Testbeds

2019 ◽  
Vol 2019 ◽  
pp. 1-8 ◽  
Author(s):  
Almudena Díaz Zayas ◽  
Bruno García García ◽  
Pedro Merino

This paper describes the end-to-end automation framework developed as part of the TRIANGLE project. The TRIANGLE project is devoted to the benchmarking of apps and devices in mobile networks. For that purpose, it is needed to ensure the repeatability in the behaviour of all the components of the mobile network during the execution of the same test. This is why one of the main objectives of the project was to develop an end-to-end automation framework to provide repeatable testing. This paper describes in detail the design and the implementation of the framework.

2019 ◽  
Vol 8 (4) ◽  
pp. 5515-5519

Mobile networks are fast and flexible for effective communication, where it only needs a dynamic topology and unstructured network construction. Due to this flexible nature, the resource utilization and energy consumption is high when comparing to the other static networks. In this scenario, packet redundancy is major problem on mobile networks, which increases network traffic and energy. Currently redundancy elimination is performed using redundancy elimination (RE) solution, which affects the end-to-end privacy. To eliminate redundant packet transfers and provide fast and secure packet transfer in the dynamic mobile network, a new middle box framework is proposed in this paper. This framework is named as Sift Hub, which is a centre point to verify the packet redundancy and security violations. This includes four algorithms to perform packet redundancy elimination, packet scheduling and verification. The algorithms are One pass signature generation algorithm (OSGA) for packet security, Predictive encryption technique using enhanced hidden vector encryption algorithm for redundancy detection on encrypted traffic, Packet level data filtering algorithm (PLDF) for eliminating un-authenticated and redundant packets and RAPS-Redundancy aware packet scheduling algorithm for fast data scheduling over dynamic mobile networks. The Shift_Hub supports inter and intra packet level redundancy elimination and secure packet scheduling without affecting the end-to-end privacy. The Shift_Hub is implemented and the performance is evaluated on dynamic mobile network scenario created on NS2 simulator. The results shows, the proposed work gives better performance in finding and eliminating redundant packet in secure manner than the existing works


2018 ◽  
Author(s):  
Phanidra Palagummi ◽  
Vedant Somani ◽  
Krishna M. Sivalingam ◽  
Balaji Venkat

Networking connectivity is increasingly based on wireless network technologies, especially in developing nations where the wired network infrastructure is not accessible to a large segment of the population. Wireless data network technologies based on 2G and 3G are quite common globally; 4G-based deployments are on the rise during the past few years. At the same time, the increasing high-bandwidth and low-latency requirements of mobile applications has propelled the Third Generation Partnership Project (3GPP) standards organization to develop standards for the next generation of mobile networks, based on recent advances in wireless communication technologies. This standard is called the Fifth Generation (5G) wireless network standard. This paper presents a high-level overview of the important architectural components, of the advanced communication technologies, of the advanced networking technologies such as Network Function Virtualization and other important aspects that are part of the 5G network standards. The paper also describes some of the common future generation applications that require low-latency and high-bandwidth communications.


Network ◽  
2021 ◽  
Vol 1 (2) ◽  
pp. 75-94
Author(s):  
Ed Kamya Kiyemba Edris ◽  
Mahdi Aiash ◽  
Jonathan Loo

Fifth Generation mobile networks (5G) promise to make network services provided by various Service Providers (SP) such as Mobile Network Operators (MNOs) and third-party SPs accessible from anywhere by the end-users through their User Equipment (UE). These services will be pushed closer to the edge for quick, seamless, and secure access. After being granted access to a service, the end-user will be able to cache and share data with other users. However, security measures should be in place for SP not only to secure the provisioning and access of those services but also, should be able to restrict what the end-users can do with the accessed data in or out of coverage. This can be facilitated by federated service authorization and access control mechanisms that restrict the caching and sharing of data accessed by the UE in different security domains. In this paper, we propose a Data Caching and Sharing Security (DCSS) protocol that leverages federated authorization to provide secure caching and sharing of data from multiple SPs in multiple security domains. We formally verify the proposed DCSS protocol using ProVerif and applied pi-calculus. Furthermore, a comprehensive security analysis of the security properties of the proposed DCSS protocol is conducted.


2017 ◽  
Vol 25 (0) ◽  
pp. 153-163 ◽  
Author(s):  
Akihiro Nakao ◽  
Ping Du ◽  
Yoshiaki Kiriha ◽  
Fabrizio Granelli ◽  
Anteneh Atumo Gebremariam ◽  
...  

Data ◽  
2018 ◽  
Vol 4 (1) ◽  
pp. 1 ◽  
Author(s):  
John Sospeter ◽  
Di Wu ◽  
Saajid Hussain ◽  
Tesfanesh Tesfa

Mobile network topology changes dynamically over time because of the high velocity of vehicles. Therefore, the concept of the data dissemination scheme in a VANET environment has become an issue of debate for many research scientists. The main purpose of VANET is to ensure passenger safety application by considering the critical emergency message. The design of the message dissemination protocol should take into consideration effective data dissemination to provide a high packet data ratio and low end-to-end delay by using network resources at a minimal level. In this paper, an effective and efficient adaptive probability data dissemination protocol (EEAPD) is proposed. EEAPD comprises a delay scheme and probabilistic approach. The redundancy ratio (r) metric is used to explain the correlation between road segments and vehicles’ density in rebroadcast probability decisions. The uniqueness of the EEAPD protocol comes from taking into account the number of road segments to decide which nodes are suitable for rebroadcasting the emergency message. The last road segment is considered in the transmission range because of the probability of it having small vehicle density. From simulation results, the proposed protocol provides a better high-packet delivery ratio and low-packet drop ratio by providing better use of the network resource within low end-to-end delay. This protocol is designed for only V2V communication by considering a beaconless strategy. the simulations in this study were conducted using Ns-3.26 and traffic simulator called “SUMO”.


Author(s):  
Elarbi Abderraouf ◽  
Abdesselam Bassou ◽  
Mohamed Rida Lahcene Rida Lahcene

<p>Thanks to the success of smart phones and mobile-ready laptops, data traffic has recently grown exponentially, and the demand for mobile data has risen very dramatically. These requests in large capacity can only be satisfied by a high efficiency and a very good optimization of the infrastructures of the mobile networks, while taking into account the constraints which are the power, bandwidth and a limited complexity. The task of developing mobile technologies has also evolved from a national or regional focus to a complex and growing mission, supported by global standards development organizations such as 3GPP (3rd Group Partnership Project). Through this research, we present everything related to the simulation of the 4G mobile network system (LTE), which can provide high data flow with good quality, through three model channels known as (EPA, EVA, ETU). In this work we focus on the block ‘iterative decoding channel encoder’ in the LTE system, where the iterative channel coding called ‘Turbo-code’ (TC) is substituted by the iterative coding channel called ‘Unpunctured Turbo Trellis-coded Modulation’ (UTTCM). The simulation results showed that with less decoding complexities, UTTCM's LTE system gives good performance (in terms of BER).</p>


Author(s):  
Marzook Khatri

Abstract: The deployment of 5G mobile communication networks is just getting started right now. There are numerous technologies available today, each capable of fulfilling activities such as enabling voice traffic via voice over IP (VoIP), providing broadband data access in mobile environments, and so on. However, there is a pressing need to implement technology that can bring all of these systems together into a single unified system. Because it is all about smoothly integrating terminals, networks, and applications, 8G presents a solution to this dilemma. In this work, an attempt is made to provide a study of various cellular technologies, such as 4G, 5G, 6G, 7G, and FG, as well as a detailed comparison between them. With the introduction of network virtualization and the implementation of 5G/IoT, mobile networks will become more complicated and offer more diverse services. This raises concerns about a considerable increase in the workload of network operations. Meanwhile, artificial intelligence (AI) is advancing rapidly and is projected to alleviate human resource shortages in a variety of industries. Similarly, the mobile industry is gaining traction in the application of artificial intelligence (AI) to network operations in order to improve the efficiency of mobile network operations. This paper will address the idea of using AI technology to network operations and will give various use examples to demonstrate that AI-driven network operations have a bright future. Keywords: 5G & 6G networks, Artificial Intelligence, Next generation network, Future Advancement.


2020 ◽  
Vol 17 (1) ◽  
pp. 51-70
Author(s):  
Jesús Calle-Cancho ◽  
José-Manuel Mendoza-Rubio ◽  
José-Luis González-Sánchez ◽  
David Cortés-Polo ◽  
Javier Carmona-Murillo

The number of mobile subscribers, as well as the data traffic generated by them, is increasing exponentially with the growth of wireless smart devices and the number of network services that they can support. This significant growth is pushing mobile network operators towards new solutions to improve their network performance and efficiency. Thus, the appearance of Software Defined Networking (SDN) can overcome the limitations of current deployments through decoupling the network control plane from the data plane, allowing higher flexibility and programmability to the network. In this context, the process of handling user mobility becomes an essential part of future mobile networks. Taking advantage of the benefits that SDN brings, in this article we present a novel mobility management solution. This proposal avoids the use of IP-IP tunnels and it adds the dynamic flow management capability provided by SDN. In order to analyse performance, an analytical model is developed to compare it with NB-DMM (Network-based DMM), one of the main DMM (Distributed Mobility Management) solutions. Additionally, performance is also evaluated with an experimental testbed. The results allow handover latency in real scenarios and numerical investigations to be measured, and also show that SR-DMM achieves better efficiency in terms of signaling and routing cost than NB-DMM solution.


Sign in / Sign up

Export Citation Format

Share Document