scholarly journals Micro Operator Design Pattern in 5G SDN/NFV Network

2018 ◽  
Vol 2018 ◽  
pp. 1-14 ◽  
Author(s):  
Chia-Wei Tseng ◽  
Yu-Kai Huang ◽  
Fan-Hsun Tseng ◽  
Yao-Tsung Yang ◽  
Chien-Chang Liu ◽  
...  

The trend of 5G mobile networks is increasing with the number of users and the transmission rate. Many operators are turning to small cell and indoor coverage of telecom network service. With the emerging Software Defined Networking and Network Function Virtualization technologies, Internet Service Provider is able to deploy their networks more flexibly and dynamically. In addition to the change of the wireless mobile network deployment model, it also drives the development trend of the Micro Operator (μO). Telecom operators can provide regional network services through public buildings, shopping malls, or industrial sites. In addition, localized network services are provided and bandwidth consumption is reduced. The distributed architecture ofμO tackles computing requirements for applications, data, and services from cloud data center to edge network devices or to the micro data center ofμO. The service model ofμO is capable of reducing network latency in response to the low-latency applications for future 5G edge computing environment. This paper addresses the design pattern of 5G micro operator and proposes a Decision Tree Based Flow Redirection (DTBFR) mechanism to redirect the traffic flows to neighbor service nodes. The DTBFR mechanism allows differentμOs to share network resources and speed up the development of edge computing in the future.

2021 ◽  
Vol 11 (4) ◽  
pp. 43-57
Author(s):  
Jitendra Singh

Involvement of multiple cloud providers enhances the security complexity in cloud computing. Despite engaging best in class human and hardware resources, cyber-attacks in cloud paradigm continue to rise. This work aims to explore the cloud vulnerabilities that arise due to the multiple entry points. Underlying security threats are categorized into resources at providers' end, hardware security, transmission security, process security, and endpoint security. To mitigate the cyber-attacks in cloud, this work proposed a comprehensive multi-point-based framework that leverages the underlying hardware to strengthen the security at the user's end, internet service provider's end, and at the cloud data center. Security is further fortified by including the process level interaction at terminals. Framework is advanced enough to accommodate the vulnerable points of a system and a network. With the implementation of the proposed system, potential attacks can be detected during early state of penetration.


Author(s):  
Marija Skulysh ◽  
Catherina Domracheva

The trend of mobile networks 5G is growing with the increase in the number of users and the speed of transmission. Many operators are turning to small cellular and internal coverage of telecommunication network services. Due to the emergence of software-specific network technologies and virtualization of network functions, the ISP can deploy its networks more flexibly and dynamically. In addition to changing the model for deploying a wireless mobile network, it also determines the tendency for micro-operators to develop (μO). Communication operators can provide regional network services through public buildings, shopping malls or industrial facilities. In addition, localized network services are provided and bandwidth consumption is reduced. The distributed μO architecture meets the computing requirements for applications, data, and services from the cloud data center to the peripheral network devices or the micro-data center μO. The μO service model is able to reduce network latency in response to applications with a low latency for the future 5G boundary computing environment. This article discusses the design of the micro-operator 5G and proposes a mechanism for redirecting flows based on the decision tree (DTBFR) to redirect traffic flows to neighboring service nodes. The DTBFR mechanism allows different microcontrollers to share network resources and accelerate the development of border computing in the future.


2018 ◽  
Vol 6 (2) ◽  
pp. 287-292
Author(s):  
M.R. Dave ◽  
◽  
H.B. Patel ◽  
B. Shrimali ◽  
◽  
...  

2018 ◽  
Vol 12 (4) ◽  
pp. 3509-3518
Author(s):  
Sourav Kanti Addya ◽  
Ashok Kumar Turuk ◽  
Bibhudatta Sahoo ◽  
Anurag Satpathy ◽  
Mahasweta Sarkar

Sign in / Sign up

Export Citation Format

Share Document