End-to-End Network Slicing in Radio Access Network, Transport Network and Core Network Domains

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

End-to-End Network Access Analysis

© End-to-End Network Access Analysis Sruthi Bandhakavi, Sandeep Bhatt, Cat Okita, Prasad Rao HP Laboratories HPL-2008-28R1 No keywords available. Network security administrators cannot always accurately tell which end-to-end accesses are permitted within their network, and which ones are not. The problem is that every access is determined by the configurations of multiple, separately administer...

متن کامل

End-to-end Network Slicing for 5G Mobile Networks

The research and development (R&D) and the standardization of the 5th Generation (5G) mobile networking technologies are proceeding at a rapid pace all around the world. In this paper, we introduce the emerging concept of network slicing that is considered one of the most significant technology challenges for 5G mobile networking infrastructure, summarize our preliminary research efforts to ena...

متن کامل

Future Wireless Network: MyNET Platform and End-to-End Network Slicing

Future wireless networks are facing new challenges. These new challenges require new solutions and strategies of the network deployment, management, and operation. Many driving factors are decisive in the re-definition and re-design of the future wireless network architecture. In the previously published paper “5G Wireless Network – MyNET and SONAC”, MyNET and SONAC, a future network architectu...

متن کامل

End-to-end Resource Allocation in a Multi Access Network

Broadband Access Networks are composed of a wide variety of access technologies and transport protocols hindering end-to-end Quality of Service (QoS) provisioning. Protocol diversity could be overcome by defining appropriate internetworking protocols, but access technology diversity is more difficult to tackle. This problem could be mitigated by obtaining diagnostic information of each specific...

متن کامل

End-to-End Network Security

Traditionally, the kernel has provided extremely limited protection of network communications. This is especially nettlesome since network connections are the conduits through which the computer systems are most vulnerable. IPSec is now widely available to protect network connections, encrypting network communications in the kernel. But cryptography alone is insufficient to implement end-to-end...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2020

ISSN: 2169-3536

DOI: 10.1109/access.2020.2972105