• Title/Summary/Keyword: challenges in4G network

Search Result 18, Processing Time 0.021 seconds

Resource Management in 5G Mobile Networks: Survey and Challenges

  • Chien, Wei-Che;Huang, Shih-Yun;Lai, Chin-Feng;Chao, Han-Chieh
    • Journal of Information Processing Systems
    • /
    • v.16 no.4
    • /
    • pp.896-914
    • /
    • 2020
  • With the rapid growth of network traffic, a large number of connected devices, and higher application services, the traditional network is facing several challenges. In addition to improving the current network architecture and hardware specifications, effective resource management means the development trend of 5G. Although many existing potential technologies have been proposed to solve the some of 5G challenges, such as multiple-input multiple-output (MIMO), software-defined networking (SDN), network functions virtualization (NFV), edge computing, millimeter-wave, etc., research studies in 5G continue to enrich its function and move toward B5G mobile networks. In this paper, focusing on the resource allocation issues of 5G core networks and radio access networks, we address the latest technological developments and discuss the current challenges for resource management in 5G.

Key Challenges of Mobility Management and Handover Process In 5G HetNets

  • Alotaibi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.139-146
    • /
    • 2022
  • Wireless access technologies are emerging to enable high data rates for mobile users and novel applications that encompass both human and machine-type interactions. An essential approach to meet the rising demands on network capacity and offer high coverage for wireless users on upcoming fifth generation (5G) networks is heterogeneous networks (HetNets), which are generated by combining the installation of macro cells with a large number of densely distributed small cells Deployment in 5G architecture has several issues because to the rising complexity of network topology in 5G HetNets with many distinct base station types. Aside from the numerous benefits that dense small cell deployment delivers, it also introduces key mobility management issues such as frequent handover (HO), failures, delays and pingpong HO. This article investigates 5G HetNet mobility management in terms of radio resource control. This article also discusses the key challenges for 5G mobility management.

Strategic and Technological Challenges for Wireless Communications beyond 3G

  • Evci, Cengiz;Barth, Ulrich;Sehier, Philippe
    • Journal of Communications and Networks
    • /
    • v.4 no.4
    • /
    • pp.302-313
    • /
    • 2002
  • In order to facilitate and to meet the ever increasing demands for the wireless communication in the next decade and also to satisfy the high data rates for the new services, the future development of 3G (IMT2000) and systems beyond 3G (B3G) are foreseen. This article presents the need for these developments and motivations for systems beyond 3G taking into account both strategic and technological challenges to be faced. Moreover, the concepts and potential technologies involved including multiple airinterfaces, efficient spectrum allocation and utilisation for the success of systems B3G are briefly reviewed.

A Study of 4G Network for Security System

  • Kim, Suk-jin;Lee, Hyangran;Lee, Malrey
    • International Journal of Advanced Culture Technology
    • /
    • v.3 no.2
    • /
    • pp.77-86
    • /
    • 2015
  • In this paper there is an overview of some standards and security models which are implemented in such an IP-based and heterogeneous networks and we also present some security models in an open environment and finally we obtain that as a result of the nature of 4G networks there are still more security holes and open issues for expert to notice. Our survey shows that a number of new security threats to cause unexpected service interruption and disclosure of information will be possible in 4G due mainly to the fact that 4G is an IP-based, heterogeneous network. Other than that, it tells about the security issues and vulnerabilities present in the above 4G standards are discussed. Finally, we point to potential areas for future vulnerabilities and evaluate areas in 4G security which warrant attention and future work by the research and advanced technology industry.

Future Trends of IoT, 5G Mobile Networks, and AI: Challenges, Opportunities, and Solutions

  • Park, Ji Su;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.16 no.4
    • /
    • pp.743-749
    • /
    • 2020
  • Internet of Things (IoT) is a growing technology along with artificial intelligence (AI) technology. Recently, increasing cases of developing knowledge services using information collected from sensor data have been reported. Communication is required to connect the IoT and AI, and 5G mobile networks have been widely spread recently. IoT, AI services, and 5G mobile networks can be configured and used as sensor-mobile edge-server. The sensor does not send data directly to the server. Instead, the sensor sends data to the mobile edge for quick processing. Subsequently, mobile edge enables the immediate processing of data based on AI technology or by sending data to the server for processing. 5G mobile network technology is used for this data transmission. Therefore, this study examines the challenges, opportunities, and solutions used in each type of technology. To this end, this study addresses clustering, Hyperledger Fabric, data, security, machine vision, convolutional neural network, IoT technology, and resource management of 5G mobile networks.

Applications of Intelligent Radio Technologies in Unlicensed Cellular Networks - A Survey

  • Huang, Yi-Feng;Chen, Hsiao-Hwa
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.7
    • /
    • pp.2668-2717
    • /
    • 2021
  • Demands for high-speed wireless data services grow rapidly. It is a big challenge to increasing the network capacity operating on licensed spectrum resources. Unlicensed spectrum cellular networks have been proposed as a solution in response to severe spectrum shortage. Licensed Assisted Access (LAA) was standardized by 3GPP, aiming to deliver data services through unlicensed 5 GHz spectrum. Furthermore, the 3GPP proposed 5G New Radio-Unlicensed (NR-U) study item. On the other hand, artificial intelligence (AI) has attracted enormous attention to implement 5G and beyond systems, which is known as Intelligent Radio (IR). To tackle the challenges of unlicensed spectrum networks in 4G/5G/B5G systems, a lot of works have been done, focusing on using Machine Learning (ML) to support resource allocation in LTE-LAA/NR-U and Wi-Fi coexistence environments. Generally speaking, ML techniques are used in IR based on statistical models established for solving specific optimization problems. In this paper, we aim to conduct a comprehensive survey on the recent research efforts related to unlicensed cellular networks and IR technologies, which work jointly to implement 5G and beyond wireless networks. Furthermore, we introduce a positioning assisted LTE-LAA system based on the difference in received signal strength (DRSS) to allocate resources among UEs. We will also discuss some open issues and challenges for future research on the IR applications in unlicensed cellular networks.

Security in Network Virtualization: A Survey

  • Jee, Seung Hun;Park, Ji Su;Shon, Jin Gon
    • Journal of Information Processing Systems
    • /
    • v.17 no.4
    • /
    • pp.801-817
    • /
    • 2021
  • Network virtualization technologies have played efficient roles in deploying cloud, Internet of Things (IoT), big data, and 5G network. We have conducted a survey on network virtualization technologies, such as software-defined networking (SDN), network functions virtualization (NFV), and network virtualization overlay (NVO). For each of technologies, we have explained the comprehensive architectures, applied technologies, and the advantages and disadvantages. Furthermore, this paper has provided a summarized view of the latest research works on challenges and solutions of security issues mainly focused on DDoS attack and encryption.

Design and Implementation of Key Frame Sharing Application in Android Using Chord Protocol

  • Kim, Kang Wook
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.4
    • /
    • pp.405-412
    • /
    • 2014
  • Due to the popularity of mobile phones, Peer-to-Peer (P2P) content sharing in mobile phones is highly desirable, especially in a mobile data connection. In addition, there has been an increasing demand for content sharing applications for P2P communication in Android-based smartphones as ubiquitous mobile devices. However, due to wireless network limits, unstable characteristic and restricted storage space, mobile users confront challenges in establishing connections and sharing video frames with other users. To solve this issue, we propose an architectural design and implementation of key frame sharing application that uses Chord, a distributed lookup protocol to establish a content sharing platform for mobile devices, combined with the Chord SDK based on Android. Our proposed system enables users easily to share key information on video data in real-time over a wireless network without manual processing of devices which join or leave the group and cost associated with the 3G/4G network.

Proposing m-Government Service Architecture Design Using Enterprise Architecture in Mongolia

  • Erdenebold, Tumennast
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.3
    • /
    • pp.261-270
    • /
    • 2014
  • The utilization of the Mobile Government system is having more than a few challenges including complexity of different mobile technologies, determining interoperability among existing systems and infrastructures, and establishing services with secured networks. To get over those challenges, integrated standard, innovative and comprehensive system architecture is required by the M-Government. Hence this study proposed reference EA framework for M-Government system in order to avoid unnecessary duplication of infrastructure deployment and integrate services among different government instructions. The study based on literature review, and current infrastructure and mobile network situation for delivering Government services of Mongolia. The study recommends innovative m-Government system framework used EA, and scope covered mobile service delivery area centered on G4C and C2G perspectives. The Federal Enterprise Architecture Framework has used in this research, and the proposed system service architecture defines the interoperable standards, infrastructure components, applications, and technologies for government institutions in Mongolia to aid interactions necessity among them to provide m-Service.

Jumpstarting the Digital Revolution: Exploring Smart City Architecture and Themes

  • Maha Alqahtani;Kholod M. Alqahtani
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.110-122
    • /
    • 2023
  • Over the last few decades, various innovative technologies have emerged that have significantly contributed to making life easier for humans. Various information and communication technologies (ITCs) have emerged as a result of the global technological revolution, including big data, IoT, 4G and 5G networks, cloud computing, mobile computing, and artificial intelligence. These technologies have been adopted in urban planning and development, which gave rise to the concept of smart cities in the 1990s. A smart city is a type of city that uses ITCs to exchange and share information to enhance the quality of services for its citizens. With the global population increasing at unprecedented levels, cities are overwhelmed with a myriad of challenges, such as the energy crisis, environmental pollution, sanitation and sewage challenges, and water quality issues, and therefore, have become a convergence point of economic, social, and environmental risks. The concept of a smart city is a multidisciplinary, unified approach that has been adopted by governments and municipalities worldwide to overcome these challenges. Though challenging, this transformation is essential for cities with differing technological and social features, which all have the potential to determine the success or failure of the digital transformation of cities into smart cities. In recent years, researchers, businesses, and the government have all turned their attention to the emerging field of smart cities. Accordingly, this paper aims to represent a thorough understanding of the movement toward smart cities. The key themes identified are smart city definitions and concepts, smart city dimensions, and smart city architecture of different layers. Furthermore, this article discusses the challenges and some examples of smart cities.