Future Generation Network Architecture (New Arch)

Author(s):  
David Clark ◽  
Karen Sollins ◽  
John Wroclawski ◽  
Dina Katabi ◽  
Joanna Kulik
2018 ◽  
Author(s):  
Phanidra Palagummi ◽  
Vedant Somani ◽  
Krishna M. Sivalingam ◽  
Balaji Venkat

Networking connectivity is increasingly based on wireless network technologies, especially in developing nations where the wired network infrastructure is not accessible to a large segment of the population. Wireless data network technologies based on 2G and 3G are quite common globally; 4G-based deployments are on the rise during the past few years. At the same time, the increasing high-bandwidth and low-latency requirements of mobile applications has propelled the Third Generation Partnership Project (3GPP) standards organization to develop standards for the next generation of mobile networks, based on recent advances in wireless communication technologies. This standard is called the Fifth Generation (5G) wireless network standard. This paper presents a high-level overview of the important architectural components, of the advanced communication technologies, of the advanced networking technologies such as Network Function Virtualization and other important aspects that are part of the 5G network standards. The paper also describes some of the common future generation applications that require low-latency and high-bandwidth communications.


2019 ◽  
pp. 127-223 ◽  
Author(s):  
Devaki Chandramouli ◽  
Subramanya Chandrashekar ◽  
Andreas Maeder ◽  
Tuomas Niemela ◽  
Thomas Theimer ◽  
...  

2018 ◽  
Vol 18 (2) ◽  
pp. 12-29
Author(s):  
Nandhakumar Pandi ◽  
Mohsin Nargund

AbstractCommunication is one of the most important things in human life, day by day the technology is changing, data rate becomes faster and equipment’s are also becoming compact, as the results of change in technology. The human beings have also adapted to the technology as well. In this article the revolution of wireless technologies like 2G, 3G, 4G and 5G (Future generation network) are explained. This article mainly focused on background of wireless communication system, models and technologies adapted for 4G and 5G. The key technologies, spectrum allocation and current projects are discussed and described; this work gives a detailed research to address the projects and developments for future generation wireless technology.


2021 ◽  
Vol 7 ◽  
pp. e435
Author(s):  
Adnan Mahmood Qureshi ◽  
Nadeem Anjum ◽  
Rao Naveed Bin Rais ◽  
Masood Ur-Rehman ◽  
Amir Qayyum

As a promising next-generation network architecture, named data networking (NDN) supports name-based routing and in-network caching to retrieve content in an efficient, fast, and reliable manner. Most of the studies on NDN have proposed innovative and efficient caching mechanisms and retrieval of content via efficient routing. However, very few studies have targeted addressing the vulnerabilities in NDN architecture, which a malicious node can exploit to perform a content poisoning attack (CPA). This potentially results in polluting the in-network caches, the routing of content, and consequently isolates the legitimate content in the network. In the past, several efforts have been made to propose the mitigation strategies for the content poisoning attack, but to the best of our knowledge, no specific work has been done to address an emerging attack-surface in NDN, which we call an interest flooding attack. Handling this attack-surface can potentially make content poisoning attack mitigation schemes more effective, secure, and robust. Hence, in this article, we propose the addition of a security mechanism in the CPA mitigation scheme that is, Name-Key Based Forwarding and Multipath Forwarding Based Inband Probe, in which we block the malicious face of compromised consumers by monitoring the Cache-Miss Ratio values and the Queue Capacity at the Edge Routers. The malicious face is blocked when the cache-miss ratio hits the threshold value, which is adjusted dynamically through monitoring the cache-miss ratio and queue capacity values. The experimental results show that we are successful in mitigating the vulnerability of the CPA mitigation scheme by detecting and blocking the flooding interface, at the cost of very little verification overhead at the NDN Routers.


2009 ◽  
pp. 3519-3543
Author(s):  
Abid Abdelouahab ◽  
Fouad Mohammed Abbou ◽  
Ewe Hong Tat ◽  
Toufik Taibi

To exploit the unprecedented opportunities offered by the E-Service Applications, businesses and users alike would need a highly-available, reliable, and efficient telecommunication infrastructure. This chapter provides an insight into building the next-generation network infrastructure, that is, the All-Optical Internet. It also reveals the factors driving the convergence of the Internet Protocol (IP) and the Wavelength-Division Multiplexing (WDM) technology. The chapter discusses the dominant optical networks architectures in an attempt to show the evolution towards the ultimate all-optical packet-switching network. A special focus is given to the Optical Burst Switching (OBS) as a new emerging switching paradigm and a highly promising technology. OBS network architecture, burst assembly, signaling and reservation protocols, QoS support, and contention resolution techniques are presented. Furthermore, realistic suggestions and strategies to efficiently deploy OBS are given.


Author(s):  
Abid Abdelouahab ◽  
Fouad Mohammed Abbou ◽  
Ewe Hong Tat ◽  
Toufik Taibi

To exploit the unprecedented opportunities offered by the E-Service Applications, businesses and users alike would need a highly-available, reliable, and efficient telecommunication infrastructure. This chapter provides an insight into building the next-generation network infrastructure, that is, the All-Optical Internet. It also reveals the factors driving the convergence of the Internet Protocol (IP) and the Wavelength-Division Multiplexing (WDM) technology. The chapter discusses the dominant optical networks architectures in an attempt to show the evolution towards the ultimate all-optical packet-switching network. A special focus is given to the Optical Burst Switching (OBS) as a new emerging switching paradigm and a highly promising technology. OBS network architecture, burst assembly, signaling and reservation protocols, QoS support, and contention resolution techniques are presented. Furthermore, realistic suggestions and strategies to efficiently deploy OBS are given.


Sign in / Sign up

Export Citation Format

Share Document