scholarly journals Network Selection Strategies and Resource Management Schemes in Integrated Heterogeneous Wireless and Mobile Networks

Author(s):  
Wei Shen ◽  
Qing-An Zeng

Integrated heterogeneous wireless and mobile network (IHWMN) is introduced by combing different types of wireless and mobile networks (WMNs) in order to provide more comprehensive service such as high bandwidth with wide coverage. In an IHWMN, a mobile terminal equipped with multiple network interfaces can connect to any available network, even multiple networks at the same time. The terminal also can change its connection from one network to other networks while still keeping its communication alive. Although IHWMN is very promising and a strong candidate for future WMNs, it brings a lot of issues because different types of networks or systems need to be integrated to provide seamless service to mobile users. In this chapter, the authors focus on some major issues in IHWMN. Several noel network selection strategies and resource management schemes are also introduced for IHWMN to provide better resource allocation for this new network architecture.

2010 ◽  
pp. 1066-1083
Author(s):  
Wei Shen ◽  
Qing-An Zeng

Integrated heterogeneous wireless and mobile network (IHWMN) is introduced by combing different types of wireless and mobile networks (WMNs) in order to provide more comprehensive service such as high bandwidth with wide coverage. In an IHWMN, a mobile terminal equipped with multiple network interfaces can connect to any available network, even multiple networks at the same time. The terminal also can change its connection from one network to other networks while still keeping its communication alive. Although IHWMN is very promising and a strong candidate for future WMNs, it brings a lot of issues because different types of networks or systems need to be integrated to provide seamless service to mobile users. In this chapter, the authors focus on some major issues in IHWMN. Several noel network selection strategies and resource management schemes are also introduced for IHWMN to provide better resource allocation for this new network architecture.


2018 ◽  
Author(s):  
Phanidra Palagummi ◽  
Vedant Somani ◽  
Krishna M. Sivalingam ◽  
Balaji Venkat

Networking connectivity is increasingly based on wireless network technologies, especially in developing nations where the wired network infrastructure is not accessible to a large segment of the population. Wireless data network technologies based on 2G and 3G are quite common globally; 4G-based deployments are on the rise during the past few years. At the same time, the increasing high-bandwidth and low-latency requirements of mobile applications has propelled the Third Generation Partnership Project (3GPP) standards organization to develop standards for the next generation of mobile networks, based on recent advances in wireless communication technologies. This standard is called the Fifth Generation (5G) wireless network standard. This paper presents a high-level overview of the important architectural components, of the advanced communication technologies, of the advanced networking technologies such as Network Function Virtualization and other important aspects that are part of the 5G network standards. The paper also describes some of the common future generation applications that require low-latency and high-bandwidth communications.


2021 ◽  
Author(s):  
Abdelfatteh Haidine ◽  
Fatima Zahra Salmam ◽  
Abdelhak Aqqal ◽  
Aziz Dahbi

The deployment of 4G/LTE (Long Term Evolution) mobile network has solved the major challenge of high capacities, to build real broadband mobile Internet. This was possible mainly through very strong physical layer and flexible network architecture. However, the bandwidth hungry services have been developed in unprecedented way, such as virtual reality (VR), augmented reality (AR), etc. Furthermore, mobile networks are facing other new services with extremely demand of higher reliability and almost zero-latency performance, like vehicle communications or Internet-of-Vehicles (IoV). Using new radio interface based on massive MIMO, 5G has overcame some of these challenges. In addition, the adoption of software defend networks (SDN) and network function virtualization (NFV) has added a higher degree of flexibility allowing the operators to support very demanding services from different vertical markets. However, network operators are forced to consider a higher level of intelligence in their networks, in order to deeply and accurately learn the operating environment and users behaviors and needs. It is also important to forecast their evolution to build a pro-actively and efficiently (self-) updatable network. In this chapter, we describe the role of artificial intelligence and machine learning in 5G and beyond, to build cost-effective and adaptable performing next generation mobile network. Some practical use cases of AI/ML in network life cycle are discussed.


2019 ◽  
Vol 11 (7) ◽  
pp. 152 ◽  
Author(s):  
Andrea G. Forte ◽  
Wei Wang ◽  
Luca Veltri ◽  
Gianluigi Ferrari

Over the years, the cellular mobile network has evolved from a wireless plain telephone system to a very complex system providing telephone service, Internet connectivity and many interworking capabilities with other networks. Its air interface performance has increased drastically over time, leading to high throughput and low latency. Changes to the core network, however, have been slow and incremental, with increased complexity worsened by the necessity of backwards-compatibility with older-generation systems such as the Global System for Mobile communication (GSM). In this paper, a new virtualized Peer-to-Peer (P2P) core network architecture is presented. The key idea of our approach is that each user is assigned a private virtualized copy of the whole core network. This enables a higher degree of security and novel services that are not possible in today’s architecture. We describe the new architecture, focusing on its main elements, IP addressing, message flows, mobility management, and scalability. Furthermore, we will show some significant advantages this new architecture introduces. Finally, we investigate the performance of our architecture by analyzing voice-call traffic available in a database of a large U.S. cellular network provider.


Author(s):  
Sulata Mitra

This chapter develops the concept of route optimization in a multi-homed mobile network. In a future wireless network a user may have multiple mobile devices, each having multiple network interfaces and needing interconnection with each other as well as with other networks to form a mobile network. Such mobile networks may be multi-homed i.e. having multiple points of attachment to the Internet. It forwards packets of mobile network nodes inside it to Internet using suitable routes. But there may be multiple routes in a mobile network for forwarding packets of mobile network node. Moreover, the mobile network nodes inside a mobile network may have packets of different service types. So the optimal route selection inside a mobile network depending upon the service type of mobile network node is an important research issue. Two different route optimization schemes to create point to point network among mobile network nodes are elaborated in this chapter. This chapter is aimed at the researchers and the policy makers making them aware of the different means of efficient route selection in a multi-homed mobile network as well as understanding the problem areas that need further vigorous research.


Mobile networks are evolving towards the fifth generation, with radical changes in the delivery of user services. To take advantage of the new investigative opportunities, mobile network forensics need to address several technical, legal, and implementation challenges. The future mobile forensics need to adapt to the novelties in the network architecture, establish capabilities for investigation of transnational crimes, and combat clever anti-forensics methods. At the same time, legislation needs to create an investigative environment where strong privacy safeguards exist for all subjects of investigation. These are rather complex challenges, which, if addressed adequately, will ensure investigative continuity and keep the reputation of mobile network forensics as a highly effective discipline. In this context, this chapter elaborates the next-generation of mobile network forensics.


2022 ◽  
Author(s):  
Chi-Jen Wu

We argue that the capital expenditures made by an individual mobile network operator is extremely high and risky. Also, radio spectrum sharing still lacks intelligence in the current architecture of mobile networks and needs to be rethought. We propose that the goal for a disruptive innovation, in the future mobile network architecture, that shall be able to free mobile network operators from having to hold spectrum licenses and natively enable intelligent radio spectrum sharing among multiple mobile network operators. On the basis of the design principles, the duty of a single mobile network operator is split into two roles, one focuses on infrastructure development, the other only contains authorizations on the radio spectrum usage. We introduce a new role to the mobile network architecture, named Spectrum Trader, is a primary broker for spectrum trading, and it is used to coordinate with the demand-side requests and the supply-side resources to drive demand in a \emph{real-time bidding} manner. We also introduce a spectrum embedding technique that shall enable efficient and intelligent spectrum allocation by recommending the right spectrum bands based on user scenario. Finally, several significant challenges that need to be addressed in practical deployment are investigated.


2022 ◽  
Author(s):  
Chi-Jen Wu

We argue that the capital expenditures made by an individual mobile network operator is extremely high and risky. Also, radio spectrum sharing still lacks intelligence in the current architecture of mobile networks and needs to be rethought. We propose that the goal for a disruptive innovation, in the future mobile network architecture, that shall be able to free mobile network operators from having to hold spectrum licenses and natively enable intelligent radio spectrum sharing among multiple mobile network operators. On the basis of the design principles, the duty of a single mobile network operator is split into two roles, one focuses on infrastructure development, the other only contains authorizations on the radio spectrum usage. We introduce a new role to the mobile network architecture, named Spectrum Trader, is a primary broker for spectrum trading, and it is used to coordinate with the demand-side requests and the supply-side resources to drive demand in a \emph{real-time bidding} manner. We also introduce a spectrum embedding technique that shall enable efficient and intelligent spectrum allocation by recommending the right spectrum bands based on user scenario. Finally, several significant challenges that need to be addressed in practical deployment are investigated.


Author(s):  
Madhusanka Liyanage ◽  
Mika Ylianttila ◽  
Andrei Gurtov

Virtual Private Network (VPN) services are widely used in the present corporate world to securely interconnect geographically distributed private network segments through unsecure public networks. Among various VPN techniques, Internet Protocol (IP)-based VPN services are dominating due to the ubiquitous use of IP-based provider networks and the Internet. Over last few decades, the usage of cellular/mobile networks has increased enormously due to the rapid increment of the number of mobile subscribers and the evolvement of telecommunication technologies. Furthermore, cellular network-based broadband services are able to provide the same set of network services as wired Internet services. Thus, mobile broadband services are also becoming popular among corporate customers. Hence, the usage of mobile broadband services in corporate networks demands to implement various broadband services on top of mobile networks, including VPN services. On the other hand, the all- IP-based mobile network architecture, which is proposed for beyond-LTE (Long Term Evolution) networks, is fuel to adapt IP-based VPN services in to cellular networks. This chapter is focused on identifying high-level use cases and scenarios where IP-based VPN services can be implemented on top of cellular networks. Furthermore, the authors predict the future involvement of IP-based VPNs in beyond-LTE cellular networks.


Sign in / Sign up

Export Citation Format

Share Document