End-to-End Network Slicing in Radio Access Network, Transport Network and Core Network Domains
نویسندگان
چکیده
منابع مشابه
End-to-End Network Access Analysis
© End-to-End Network Access Analysis Sruthi Bandhakavi, Sandeep Bhatt, Cat Okita, Prasad Rao HP Laboratories HPL-2008-28R1 No keywords available. Network security administrators cannot always accurately tell which end-to-end accesses are permitted within their network, and which ones are not. The problem is that every access is determined by the configurations of multiple, separately administer...
متن کاملEnd-to-end Network Slicing for 5G Mobile Networks
The research and development (R&D) and the standardization of the 5th Generation (5G) mobile networking technologies are proceeding at a rapid pace all around the world. In this paper, we introduce the emerging concept of network slicing that is considered one of the most significant technology challenges for 5G mobile networking infrastructure, summarize our preliminary research efforts to ena...
متن کاملFuture Wireless Network: MyNET Platform and End-to-End Network Slicing
Future wireless networks are facing new challenges. These new challenges require new solutions and strategies of the network deployment, management, and operation. Many driving factors are decisive in the re-definition and re-design of the future wireless network architecture. In the previously published paper “5G Wireless Network – MyNET and SONAC”, MyNET and SONAC, a future network architectu...
متن کاملEnd-to-end Resource Allocation in a Multi Access Network
Broadband Access Networks are composed of a wide variety of access technologies and transport protocols hindering end-to-end Quality of Service (QoS) provisioning. Protocol diversity could be overcome by defining appropriate internetworking protocols, but access technology diversity is more difficult to tackle. This problem could be mitigated by obtaining diagnostic information of each specific...
متن کاملEnd-to-End Network Security
Traditionally, the kernel has provided extremely limited protection of network communications. This is especially nettlesome since network connections are the conduits through which the computer systems are most vulnerable. IPSec is now widely available to protect network connections, encrypting network communications in the kernel. But cryptography alone is insufficient to implement end-to-end...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2020
ISSN: 2169-3536
DOI: 10.1109/access.2020.2972105