• Title/Summary/Keyword: End-to-End slicing

Search Result 7, Processing Time 0.024 seconds

Comparative Analysis on Network Slicing Techniques in 5G Environment (5G 환경에서의 네트워크 슬라이싱 연구 비교 분석)

  • A Reum Ko;Ilhwan Ji;Hojun Jin;Seungho Jeon;Jung Taek Seo
    • Journal of Platform Technology
    • /
    • v.11 no.5
    • /
    • pp.84-96
    • /
    • 2023
  • Network slicing refers to a technology that divides network infrastructure into multiple parts. Network slicing enables flexible network configuration while minimizing the physical resources required for network division. For this reason, network slicing technology has recently been developed and introduced in a form suitable for the 5G environment for efficient management of large-scale network environments. However, systematic analysis of network slicing research in the 5G environment has not been conducted, resulting in a lack of systematic analysis of the technology. Accordingly, in this paper, we provide insight into network slicing technology in the 5G network environment by conducting a comparative analysis of the technology. In this study's comparative analysis, 13 literatures on network slicing in the 5G environment was identified and compared and analyzed through a systematic procedure. As a result of the analysis, three network slicing technologies frequently used for 5G networks were identified: RAN (radio access network) slicing, CN (core network) slicing, and E2E (end-to-end) sliding. These technologies are mainly used for network services. It was confirmed that research is being conducted to achieve quality improvement and network isolation. It is believed that the results of this comparative analysis study can contribute to 6G technology research as a future direction and utilization plan for network slicing research.

  • PDF

Trends of 5G Network Automation and Intelligence Technologies Standardization (5G 네트워크 자동화 및 지능 기술 표준화 동향)

  • Shin, M.K.;Lee, S.H.;Yi, J.H.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.2
    • /
    • pp.92-100
    • /
    • 2019
  • Vast amounts of different service-specific requirements and vertical network slicing in a 5G network increase the complexity, cost of the network management and resource operations for carriers. To solve this problem, 3GPP is working on the standardization of NWDAF to support the automation of the 5G network by utilizing artificial intelligence technologies based on Big Data to improve the efficiency of network management and resource operation. In addition, the ETSI ZSM Industry Specification Group is developing technical standards for the automation of end-to-end network management and service delivery. This document provides an overall survey of the latest standardization issues of the NWDAF in 3GPP and ETSI ZSM for 5G network automation and intelligence.

Design and Analysis of Technical Management System of Personal Information Security using Web Crawer (웹 크롤러를 이용한 개인정보보호의 기술적 관리 체계 설계와 해석)

  • Park, In-pyo;Jeon, Sang-june;Kim, Jeong-ho
    • Journal of Platform Technology
    • /
    • v.6 no.4
    • /
    • pp.69-77
    • /
    • 2018
  • In the case of personal information files containing personal information, there is insufficient awareness of personal information protection in end-point areas such as personal computers, smart terminals, and personal storage devices. In this study, we use Diffie-Hellman method to securely retrieve personal information files generated by web crawler. We designed SEED and ARIA using hybrid slicing to protect against attack on personal information file. The encryption performance of the personal information file collected by the Web crawling method is compared with the encryption decryption rate according to the key generation and the encryption decryption sharing according to the user key level. The simulation was performed on the personal information file delivered to the external agency transmission process. As a result, we compared the performance of existing methods and found that the detection rate is improved by 4.64 times and the information protection rate is improved by 18.3%.

3-D Imaging in a Chaotic Micromixer Using Confocal Laser Scanning Microscopy (CLSM) (공초점 현미경을 이용한 마이크로믹서 내부의 3차원 이미지화)

  • Kim, Hyun-Dong;Kim, Kyung-Chun
    • 한국가시화정보학회:학술대회논문집
    • /
    • 2006.12a
    • /
    • pp.96-101
    • /
    • 2006
  • 3-D visualization using confocal laser scanning microscopy (CLSM) in a chaotic micromixer was performed as a reproduction experiment and the feasibility of 3-0 imaging technique in the microscale was confirmed. For diagonal micromixer (DM) and two types of staggered herringbone micromixers (SHM) designed by Whitesides et al., to verify the evolution of mixing, cross sectional images are reconstructed at the end of every cycle. In a DM, clockwise rotational flow motion generated by diagonal ridges placed on the floor of micromixer is observed and this motion makes the fluid commingle. On the contrary, there are two rotational flow structures in the SHM and the centers of rotation exchange their position each other every half cycle because of the V shape of ridges varying their orientation every half cycle. Local rotational flow and local extensional flow generated by the complicate ridge pattern make the flow be chaotic and accelerate the mixing of fluid. The dominant parameter that influences on the mixing characteristic of SHM is not the length of micromixer but the number of ridges under the same flow configurations.

  • PDF

Big Data Based Dynamic Flow Aggregation over 5G Network Slicing

  • Sun, Guolin;Mareri, Bruce;Liu, Guisong;Fang, Xiufen;Jiang, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.10
    • /
    • pp.4717-4737
    • /
    • 2017
  • Today, smart grids, smart homes, smart water networks, and intelligent transportation, are infrastructure systems that connect our world more than we ever thought possible and are associated with a single concept, the Internet of Things (IoT). The number of devices connected to the IoT and hence the number of traffic flow increases continuously, as well as the emergence of new applications. Although cutting-edge hardware technology can be employed to achieve a fast implementation to handle this huge data streams, there will always be a limit on size of traffic supported by a given architecture. However, recent cloud-based big data technologies fortunately offer an ideal environment to handle this issue. Moreover, the ever-increasing high volume of traffic created on demand presents great challenges for flow management. As a solution, flow aggregation decreases the number of flows needed to be processed by the network. The previous works in the literature prove that most of aggregation strategies designed for smart grids aim at optimizing system operation performance. They consider a common identifier to aggregate traffic on each device, having its independent static aggregation policy. In this paper, we propose a dynamic approach to aggregate flows based on traffic characteristics and device preferences. Our algorithm runs on a big data platform to provide an end-to-end network visibility of flows, which performs high-speed and high-volume computations to identify the clusters of similar flows and aggregate massive number of mice flows into a few meta-flows. Compared with existing solutions, our approach dynamically aggregates large number of such small flows into fewer flows, based on traffic characteristics and access node preferences. Using this approach, we alleviate the problem of processing a large amount of micro flows, and also significantly improve the accuracy of meeting the access node QoS demands. We conducted experiments, using a dataset of up to 100,000 flows, and studied the performance of our algorithm analytically. The experimental results are presented to show the promising effectiveness and scalability of our proposed approach.

Network Slice Selection Function on M-CORD (M-CORD 기반의 네트워크 슬라이스 선택 기능)

  • Rivera, Javier Diaz;Khan, Talha Ahmed;Asif, Mehmood;Song, Wang-Cheol
    • KNOM Review
    • /
    • v.21 no.2
    • /
    • pp.35-45
    • /
    • 2018
  • As Network Slicing functionality gets applied to mobile networking, a mechanism that enables the selection of network slices becomes indispensable. Following the 3GPP Technical Specification for the 5G Architecture, the inclusion of the Network Slice Selection Function (NSSF) in order to leverage the process of slice selection is apparent. However, actual implementation of this network function needs to deal with the dynamic changes of network instances, due to this, a platform that supports the orchestration of Virtual Network Functions (VNF) is required. Our proposed solution include the use of the Central Office Rearchitected as a Data Center (CORD) platform, with the specified profile for mobile networks (M-CORD) that integrates a service orchestrator (XOS) alongside solutions oriented to Software Defined Networking (SDN), Network Function Virtualization (VNF) and virtual machine management through OpenStack, in order to provide the right ecosystem where our implementation of NSSF can obtain slice information dynamically by relying on synchronization between back-end services and network function instances.

Mid-term Results of the Congenital Bicuspid Aortic Valve Repair (선천성 이엽성 대동맥판막질환에 대한 판막성형술의 중기 성적)

  • 조광리;곽재건;안혁
    • Journal of Chest Surgery
    • /
    • v.37 no.10
    • /
    • pp.833-838
    • /
    • 2004
  • Background: Despite the excellent early results after the repair of congenital bicuspid aortic valve (BAV) disease, the mid-term durability of the repaired valve has still controversies. Material and Method: To evaluate the mid-term results of BAV repair, retrospective review of medical records and echocardiographic data were done. Between 1994 and 2003, twenty-two patients underwent reparative procedure for either regurgitant or stenotic congenital bicuspid aortic valve (BAV). Result: Mean age was $41\pm14$ years with male predominance (Male=17, Female=5). The pathophysiologies of the BAV were regurgitation-dominant in 20 (91%) and stenosis-dominant in 2 (9%) cases. Various repair techniques were used for raphe, prolapsed leaflet, thickened leaflet, and commissures; 1) release of raphe in 19 (86%), 2) wedge resection and primary repair in 11 (50%), pericardial patch reinforcement after plication of the leaflet in 6 (27%), and plication of the leaflet in 3 (14%), 3) slicing of thickened leaflet was used in 12 (55%) cases, 4) commissuroplasty in 8 (36%), and commissurotomy in 6 (27%) cases. There was no in-hospital mortality. During the mean follow-up of $38\pm17$ months, one patient underwent aortic valve replacement after developing acute severe regurgitation from dehiscence of the suture on postoperative 2 months. New York Heart Association functional class was improved from $1.9\pm0.6$ to $1.2\pm0.5$ (p<0.01). Left ventricular end-systolic and diastolic dimension (LVESD/LVEDD) were also improved from $45\pm9$ and $67\pm10$ to $37\pm10$ and $56\pm10,$ respectively (p<0.01). The grade of aortic regurgitation (AR) was improved from preoperative $(3.1\pm1.2)$ to post-bypass $(0.9\pm0.7).$ However, the grade at last follow-up $(1.7\pm1.1)$ was deteriorated during the follow-up period (p<0.01). Freedom from grade III and more AR at one, three, and four year were 89.7%, 89.7%, and 39.9% respectively. Conclusion: Midterm clinical result of the BAV repair was favorable. But, the durability of the repaired valve was not satisfactory.