scholarly journals A Flexible Network Architecture for 5G Systems

2019 ◽  
Vol 2019 ◽  
pp. 1-19 ◽  
Author(s):  
Mehrdad Shariat ◽  
Ömer Bulakci ◽  
Antonio De Domenico ◽  
Christian Mannweiler ◽  
Marco Gramaglia ◽  
...  

In this paper, we define a flexible, adaptable, and programmable architecture for 5G mobile networks, taking into consideration the requirements, KPIs, and the current gaps in the literature, based on three design fundamentals: (i) split of user and control plane, (ii) service-based architecture within the core network (in line with recent industry and standard consensus), and (iii) fully flexible support of E2E slicing via per-domain and cross-domain optimisation, devising inter-slice control and management functions, and refining the behavioural models via experiment-driven optimisation. The proposed architecture model further facilitates the realisation of slices providing specific functionality, such as network resilience, security functions, and network elasticity. The proposed architecture consists of four different layers identified as network layer, controller layer, management and orchestration layer, and service layer. A key contribution of this paper is the definition of the role of each layer, the relationship between layers, and the identification of the required internal modules within each of the layers. In particular, the proposed architecture extends the reference architectures proposed in the Standards Developing Organisations like 3GPP and ETSI, by building on these while addressing several gaps identified within the corresponding baseline models. We additionally present findings, the design guidelines, and evaluation studies on a selected set of key concepts identified to enable flexible cloudification of the protocol stack, adaptive network slicing, and inter-slice control and management.

Information ◽  
2019 ◽  
Vol 10 (8) ◽  
pp. 259 ◽  
Author(s):  
Jie Yuan ◽  
Erxia Li ◽  
Chaoqun Kang ◽  
Fangyuan Chang ◽  
Xiaoyong Li

Mobile edge computing (MEC) effectively integrates wireless network and Internet technologies and adds computing, storage, and processing functions to the edge of cellular networks. This new network architecture model can deliver services directly from the cloud to the very edge of the network while providing the best efficiency in mobile networks. However, due to the dynamic, open, and collaborative nature of MEC network environments, network security issues have become increasingly complex. Devices cannot easily ensure obtaining satisfactory and safe services because of the numerous, dynamic, and collaborative character of MEC devices and the lack of trust between devices. The trusted cooperative mechanism can help solve this problem. In this paper, we analyze the MEC network structure and device-to-device (D2D) trusted cooperative mechanism and their challenging issues and then discuss and compare different ways to establish the D2D trusted cooperative relationship in MEC, such as social trust, reputation, authentication techniques, and intrusion detection. All these ways focus on enhancing the efficiency, stability, and security of MEC services in presenting trustworthy services.


Author(s):  
Olena Moroz ◽  
Kostiantyn Latyshev ◽  
Viktorija Gherasymchuk

In order to meet data and service requirements, network operators are constantly expanding and improving their network infrastructure, resulting in increased capital and operating costs. However, due to intense competition and falling prices, the average income per user does not increase proportionally, which leads to a decrease in return on investment. Thus, to reduce costs and increase revenue, mobile networks need to make the next evolutionary leap towards 5G, which now applies not only to the mobile border, but also to the core network. The 5G micro-operator service architecture must also be developed together with various technologies such as SDN and NFV. SDN abstracts network architecture by separating network management and redirection functions, allowing network management to become directly programmable and the underlying infrastructure to be abstracted for applications and network services. The interaction between SDN and NFV allows the 5G network to abstractly build the system infrastructure and further increase network flexibility. Therefore, the article substantiates the possibility of market commercialization of the use of technologies of live migration of traffic flow, which allows to give the product unique characteristics. The existing approaches to the solution of the problem of load balancing of the network of 5G micro operators are analyzed. A number of advantages of the live migration method have been identified, namely the possibility of its application for the micro operator's network and efficient use of network resources. According to the results of the experiment, it was found that the method of live migration has better values µO_num (68.1% of traffic flow) than the mechanism of MLF (29.8% of traffic flow). It is proved that the mechanism of live migration can determine the priority of the user traffic flow according to the servers in the zone µO, and therefore it is expedient to apply in terms of optimizing the distribution of traffic flow. The proposed method should increase the utilization of network resources and traffic flow efficiency and lead to a higher level of experience quality (QoE) for network users.


2019 ◽  
Vol 11 (7) ◽  
pp. 152 ◽  
Author(s):  
Andrea G. Forte ◽  
Wei Wang ◽  
Luca Veltri ◽  
Gianluigi Ferrari

Over the years, the cellular mobile network has evolved from a wireless plain telephone system to a very complex system providing telephone service, Internet connectivity and many interworking capabilities with other networks. Its air interface performance has increased drastically over time, leading to high throughput and low latency. Changes to the core network, however, have been slow and incremental, with increased complexity worsened by the necessity of backwards-compatibility with older-generation systems such as the Global System for Mobile communication (GSM). In this paper, a new virtualized Peer-to-Peer (P2P) core network architecture is presented. The key idea of our approach is that each user is assigned a private virtualized copy of the whole core network. This enables a higher degree of security and novel services that are not possible in today’s architecture. We describe the new architecture, focusing on its main elements, IP addressing, message flows, mobility management, and scalability. Furthermore, we will show some significant advantages this new architecture introduces. Finally, we investigate the performance of our architecture by analyzing voice-call traffic available in a database of a large U.S. cellular network provider.


Sensors ◽  
2022 ◽  
Vol 22 (1) ◽  
pp. 349
Author(s):  
Mohammad Al Shinwan ◽  
Laith Abualigah ◽  
Trong-Dinh Huy ◽  
Ahmed Younes Shdefat ◽  
Maryam Altalhi ◽  
...  

Reaching a flat network is the main target of future evolved packet core for the 5G mobile networks. The current 4th generation core network is centralized architecture, including Serving Gateway and Packet-data-network Gateway; both act as mobility and IP anchors. However, this architecture suffers from non-optimal routing and intolerable latency due to many control messages. To overcome these challenges, we propose a partially distributed architecture for 5th generation networks, such that the control plane and data plane are fully decoupled. The proposed architecture is based on including a node Multi-session Gateway to merge the mobility and IP anchor gateway functionality. This work presented a control entity with the full implementation of the control plane to achieve an optimal flat network architecture. The impact of the proposed evolved packet Core structure in attachment, data delivery, and mobility procedures is validated through simulation. Several experiments were carried out by using NS-3 simulation to validate the results of the proposed architecture. The Numerical analysis is evaluated in terms of total transmission delay, inter and intra handover delay, queuing delay, and total attachment time. Simulation results show that the proposed architecture performance-enhanced end-to-end latency over the legacy architecture.


Sensors ◽  
2019 ◽  
Vol 19 (6) ◽  
pp. 1335 ◽  
Author(s):  
Fernando López Rodríguez ◽  
Ugo Silva Dias ◽  
Divanilson Campelo ◽  
Robson Oliveira Albuquerque ◽  
Se-Jung Lim ◽  
...  

The next generation of 5G networks is being developed to provide services with the highest Quality of Service (QoS) attributes, such as ultra-low latency, ultra-reliable communication, high data rates, and high user mobility experience. To this end, several new settings must be implemented in the mobile network architecture such as the incorporation of Network Function Virtualization (NFV) and Software-Defined Networking (SDN), along with the shift of processes to the edge of the network. This work proposes an architecture combining the NFV and SDN concepts to provide the logic for Quality of Service (QoS) traffic detection and the logic for QoS management in next-generation mobile networks. It can be applied to the mobile backhaul and the mobile core network to work with both 5G mobile access networks or current 4G access networks, keeping backward compatibility with current mobile devices. In order to manage traffic without QoS and with QoS requirements, this work incorporates Multiprotocol Label Switching (MPLS) in the mobile data plane. A new flexible and programmable method to detect traffic with QoS requirements is also proposed, along with an Evolved Packet System (EPS)-bearer/QoS-flow creation with QoS considering all elements in the path. These goals are achieved by using proactive and reactive path setup methods to route the traffic immediately and simultaneously process it in the search for QoS requirements. Finally, a prototype is presented to prove the benefits and the viability of the proposed concepts.


2020 ◽  
Author(s):  
Isra Revenia

This article is made to know the destinantion and the administrasi functions of the school in order to assist the leader of an organazation in making decisions and doing the right thing, recording of such statements in addition to the information needs also pertains to the function of accountabilitty and control functions. Administrative administration is the activity of recording for everything that happens in the organization to be used as information for leaders. While the definition of administration is all processing activities that start from collecting (receiving), recording, processing, duplicating, minimizing and storing all the information of correspondence needed by the organization. Administration is as an activity to determine everything that happens in the organization, to be used as material for information by the leadership, which includes all activities ranging from manufacturing, managing, structuring to all the preparation of information needed by the organization.


2019 ◽  
Author(s):  
Rajavelsamy R ◽  
Debabrata Das

5G promises to support new level of use cases that will deliver a better user experience. The 3rd Generation Partnership Project (3GPP) [1] defined 5G system introduced fundamental changes on top of its former cellular systems in several design areas, including security. Unlike in the legacy systems, the 5G architecture design considers Home control enhancements for roaming customer, tight collaboration with the 3rd Party Application servers, Unified Authentication framework to accommodate various category of devices and services, enhanced user privacy, and secured the new service based core network architecture. Further, 3GPP is investigating the enhancements to the 5G security aspects to support longer security key lengths, False Base station detection and wireless backhaul in the Phase-2 of 5G standardization [2]. This paper provides the key enhancements specified by the 3GPP for 5G system, particularly the differences to the 4G system and the rationale behind the decisions.


2018 ◽  
Author(s):  
Phanidra Palagummi ◽  
Vedant Somani ◽  
Krishna M. Sivalingam ◽  
Balaji Venkat

Networking connectivity is increasingly based on wireless network technologies, especially in developing nations where the wired network infrastructure is not accessible to a large segment of the population. Wireless data network technologies based on 2G and 3G are quite common globally; 4G-based deployments are on the rise during the past few years. At the same time, the increasing high-bandwidth and low-latency requirements of mobile applications has propelled the Third Generation Partnership Project (3GPP) standards organization to develop standards for the next generation of mobile networks, based on recent advances in wireless communication technologies. This standard is called the Fifth Generation (5G) wireless network standard. This paper presents a high-level overview of the important architectural components, of the advanced communication technologies, of the advanced networking technologies such as Network Function Virtualization and other important aspects that are part of the 5G network standards. The paper also describes some of the common future generation applications that require low-latency and high-bandwidth communications.


1994 ◽  
Vol 30 (1) ◽  
pp. 167-175
Author(s):  
Alan H. Vicory ◽  
Peter A. Tennant

With the attainment of secondary treatment by virtually all municipal discharges in the United States, control of water pollution from combined sewer overflows (CSOs) has assumed a high priority. Accordingly, a national strategy was issued in 1989 which, in 1993, was expanded into a national policy on CSO control. The national policy establishes as an objective the attainment of receiving water quality standards, rather than a design storm/treatment technology based approach. A significant percentage of the CSOs in the U.S. are located along the Ohio River. The states along the Ohio have decided to coordinate their CSO control efforts through the Ohio River Valley Water Sanitation Commission (ORSANCO). With the Commission assigned the responsibility of developing a monitoring approach which would allow the definition of CSO impacts on the Ohio, research by the Commission found that very little information existed on the monitoring and assessment of large rivers for the determination of CSO impacts. It was therefore necessary to develop a strategy for coordinated efforts by the states, the CSO dischargers, and ORSANCO to identify and apply appropriate monitoring approaches. A workshop was held in June 1993 to receive input from a variety of experts. Taking into account this input, a strategy has been developed which sets forth certain approaches and concepts to be considered in assessing CSO impacts. In addition, the strategy calls for frequent sharing of findings in order that the data collection efforts by the several agencies can be mutually supportive and lead to technically sound answers regarding CSO impacts and control needs.


1996 ◽  
Vol 118 (3) ◽  
pp. 482-488 ◽  
Author(s):  
Sergio Bittanti ◽  
Fabrizio Lorito ◽  
Silvia Strada

In this paper, Linear Quadratic (LQ) optimal control concepts are applied for the active control of vibrations in helicopters. The study is based on an identified dynamic model of the rotor. The vibration effect is captured by suitably augmenting the state vector of the rotor model. Then, Kalman filtering concepts can be used to obtain a real-time estimate of the vibration, which is then fed back to form a suitable compensation signal. This design rationale is derived here starting from a rigorous problem position in an optimal control context. Among other things, this calls for a suitable definition of the performance index, of nonstandard type. The application of these ideas to a test helicopter, by means of computer simulations, shows good performances both in terms of disturbance rejection effectiveness and control effort limitation. The performance of the obtained controller is compared with the one achievable by the so called Higher Harmonic Control (HHC) approach, well known within the helicopter community.


Sign in / Sign up

Export Citation Format

Share Document