{"title":"Highway Toll Collection Method for Connected Automated Vehicle Platooning Using Spatio-Temporal Grid Reservation","authors":"Babakarkhail Habibullah, R. Teng, Kenya Sato","doi":"10.4236/cn.2022.144010","DOIUrl":"https://doi.org/10.4236/cn.2022.144010","url":null,"abstract":"","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89686820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of COVID-19 on Internet Traffic in Nigeria","authors":"B. Kuboye","doi":"10.4236/cn.2022.141004","DOIUrl":"https://doi.org/10.4236/cn.2022.141004","url":null,"abstract":"","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"50 1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80205574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HBRO: A Registration Oracle Scheme for Digital Rights Management Based on Heterogeneous Blockchains","authors":"Ri OuYang","doi":"10.4236/cn.2022.141005","DOIUrl":"https://doi.org/10.4236/cn.2022.141005","url":null,"abstract":"","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"43 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79005492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The rapid progress of the deployment of IoT services pushes the evolution of wireless communication techniques. Because the number of IoT devices is much more than that of the human-held devices for traditional services. It introduces the random access issue in radio networks. In order to support massive IoT devices to transmit data in NB-IoT, the release 14 of 3 GPP provides the preambles in non-anchor carrier for random access. However, if more non-anchor carriers are provided for random access, the resource of uplink shared channel will be compressed. The use of non-anchor carrier for random access preambles shall be carefully allocated for effective resource utilization. In this paper, we propose the adaptive non-anchor allocation algorithm by referring to the collision report flag (CRF) from the user equipment. The proposed CRF algorithm considers the congestion status of uplink to adjust the number of non-anchor carriers in flexible way for better random access experience of huge random access attempts condition. The simulation results show that the proposed algorithm achieves high success access ratio and effective non-anchor carrier utilization when comparing to that of the fixed allocation schemes. The proposed scheme can save 5 10 numbers of non-anchor carriers for the number of UEs varies from 15,000 to 37,500 when comparing to the fixed 15 non-anchor carriers scheme under the similar successful access ratio.
{"title":"The Adaptive Random Access Carrier Allocation Scheme in NB-IoT Networks","authors":"Yen-Wen Chen, Guan-Yi Xue","doi":"10.4236/cn.2022.141001","DOIUrl":"https://doi.org/10.4236/cn.2022.141001","url":null,"abstract":"The rapid progress of the deployment of IoT services pushes the evolution of wireless communication techniques. Because the number of IoT devices is much more than that of the human-held devices for traditional services. It introduces the random access issue in radio networks. In order to support massive IoT devices to transmit data in NB-IoT, the release 14 of 3 GPP provides the preambles in non-anchor carrier for random access. However, if more non-anchor carriers are provided for random access, the resource of uplink shared channel will be compressed. The use of non-anchor carrier for random access preambles shall be carefully allocated for effective resource utilization. In this paper, we propose the adaptive non-anchor allocation algorithm by referring to the collision report flag (CRF) from the user equipment. The proposed CRF algorithm considers the congestion status of uplink to adjust the number of non-anchor carriers in flexible way for better random access experience of huge random access attempts condition. The simulation results show that the proposed algorithm achieves high success access ratio and effective non-anchor carrier utilization when comparing to that of the fixed allocation schemes. The proposed scheme can save 5 10 numbers of non-anchor carriers for the number of UEs varies from 15,000 to 37,500 when comparing to the fixed 15 non-anchor carriers scheme under the similar successful access ratio.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"22 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78335324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A jamming signal such as single and multiple Continuous-Wave (CW and MCW) interferences have been shown to have severe effects on the quality of the received signal in wireless communication. This paper presents an approach of a low-complexity algorithm that compares the performances of using Adaptive Notch Filter (ANF) direct and lattice forms structures based on second-order Infinite Impulse Response (IIR) Notch Filter (NF) for the detection and mitigation of CW and MCW interferences in QPSK communication systems. The approach method consists of two ANFs, adaptive IIR NF ( ) 1 1 , d l H z and adaptive IIR NF ( ) 2 2 , d l H z . The present algorithm can estimate and mitigate each CWI and computer their power in Time-Domain (TD). In results for performance comparison, the lattice IIR NF structure outperforms the direct IIR NF structure for detection and removal jamming and has a better Bit Error Ratio (BER). Furthermore, compared with the case of full suppression ( 1 1 k = ), both cases (direct and lattice form) work better for low and high-power jammers. Also, compared to the case without an IIR NF, the presented algorithm can detect and mitigate, track hopping frequency interference, and improve BER performance.
在无线通信中,单连续波和多连续波干扰会严重影响接收信号的质量。本文提出了一种低复杂度算法,比较了基于二阶无限脉冲响应(IIR)陷波滤波器(NF)的自适应陷波滤波器(ANF)直接结构和点阵形式结构在QPSK通信系统中检测和抑制CW和MCW干扰的性能。该方法由两个ANFs组成,即自适应IIR NF () 11, d 1 H z和自适应IIR NF () 22, d 1 H z。该算法可以估计和缓解每个CWI,并计算其在时域(TD)的功率。在性能比较中,点阵IIR NF结构在检测和去除干扰方面优于直接IIR NF结构,并且具有更好的误码率(BER)。此外,与完全抑制(1 1 k =)的情况相比,两种情况(直接和晶格形式)对低功率和高功率干扰器都工作得更好。此外,与不使用IIR滤波器的情况相比,该算法可以检测和减轻跳频干扰,提高误码率。
{"title":"Comparing the Performances between Adaptive Notch Filter Direct and Lattice Forms Structures for Mitigation Jamming Signals","authors":"Abdelrahman El Gebali, R. Landry","doi":"10.4236/cn.2022.143007","DOIUrl":"https://doi.org/10.4236/cn.2022.143007","url":null,"abstract":"A jamming signal such as single and multiple Continuous-Wave (CW and MCW) interferences have been shown to have severe effects on the quality of the received signal in wireless communication. This paper presents an approach of a low-complexity algorithm that compares the performances of using Adaptive Notch Filter (ANF) direct and lattice forms structures based on second-order Infinite Impulse Response (IIR) Notch Filter (NF) for the detection and mitigation of CW and MCW interferences in QPSK communication systems. The approach method consists of two ANFs, adaptive IIR NF ( ) 1 1 , d l H z and adaptive IIR NF ( ) 2 2 , d l H z . The present algorithm can estimate and mitigate each CWI and computer their power in Time-Domain (TD). In results for performance comparison, the lattice IIR NF structure outperforms the direct IIR NF structure for detection and removal jamming and has a better Bit Error Ratio (BER). Furthermore, compared with the case of full suppression ( 1 1 k = ), both cases (direct and lattice form) work better for low and high-power jammers. Also, compared to the case without an IIR NF, the presented algorithm can detect and mitigate, track hopping frequency interference, and improve BER performance.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"133 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78128499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The study was looking at establishing factors that are affecting the adoption of electronic government services in the Developing Countries for Transport sector amidst the Covid-19 pandemic based on the Unified Theory of Acceptance and Use of Technology Model (UTAUT). The study first looked at the major challenges faced by the Zambian transport sector in the implementation of e-government services among the citizens. The study then proposed a model through a web-based e-commerce web portal that could be adopted to address the challenges identified in the study. The study was based on all registered motor vehicles. These were from the various transport sectors in Zambia’s capital city, Lusaka. Both qualitative and quantitative data was collected from respondents using a structured questionnaire. The questionnaire was generated based on the UTAUT conceptual model. The response rate was 57% giving 141 questionnaire responses from the four transport providers. The Chi-Square test of independence was used to analyze the data using SPSS software. The results showed that interaction between trust in government and trust in the Internet has a significant effect on the utilisation of e-government services. The test had an observed P-Value of 0.05 against the Chi-Square value of 59.535. The results further showed that e-services control and effort expectancy had a significant impact on the actual utilisation of e-government services.
{"title":"Assessing Factors Affecting the Adoption of E-Government Services in Developing Countries for Transport Sector, amidst the Covid-19 Pandemic","authors":"Beauty Undi-Phiri, J. Phiri","doi":"10.4236/cn.2022.142006","DOIUrl":"https://doi.org/10.4236/cn.2022.142006","url":null,"abstract":"The study was looking at establishing factors that are affecting the adoption of electronic government services in the Developing Countries for Transport sector amidst the Covid-19 pandemic based on the Unified Theory of Acceptance and Use of Technology Model (UTAUT). The study first looked at the major challenges faced by the Zambian transport sector in the implementation of e-government services among the citizens. The study then proposed a model through a web-based e-commerce web portal that could be adopted to address the challenges identified in the study. The study was based on all registered motor vehicles. These were from the various transport sectors in Zambia’s capital city, Lusaka. Both qualitative and quantitative data was collected from respondents using a structured questionnaire. The questionnaire was generated based on the UTAUT conceptual model. The response rate was 57% giving 141 questionnaire responses from the four transport providers. The Chi-Square test of independence was used to analyze the data using SPSS software. The results showed that interaction between trust in government and trust in the Internet has a significant effect on the utilisation of e-government services. The test had an observed P-Value of 0.05 against the Chi-Square value of 59.535. The results further showed that e-services control and effort expectancy had a significant impact on the actual utilisation of e-government services.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"30 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73461298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years, we need more bandwidth to enjoy entertainment contents such as video streaming, music and online gaming. To gain enough bandwidth, technologies that combine bandwidth by using multiple interfaces at same time are desired. Multipath transport protocols which combine multiple paths for packet delivery at the transport layer are a promising technology. Such protocols have a mechanism, called “packet scheduler”, to select the interface to send a packet. However, existing studies of the packet scheduler have not explicitly considered the compatibility of mobility with bonding of bandwidth. Therefore, when smartphone users move out of coverage of communication networks such as wireless Local Area Network (LAN) and Long Term Evolution (LTE) by vehicle, packet loss occurs, leading to a decrease of throughput. In this study, we propose a packet scheduler that selects an appropriate communication path so that packets can reach the peer before it moves out of the coverage. Based on routes of a vehicle and the position and communication range of the access point, the time at which a communication path will be lost is predicted. In addition, we employ MPQUIC (Multipath QUIC (Quick UDP Internet Connections)), which is a multipath transport protocol proposed as the extension of QUIC protocol, to reduce the ACK packet loss in multipath communication, and to reduce the time until the starts of retransmission. We evaluated the number of packet losses, the throughput and the time until starts of retransmission using a simulator and show the superiority of proposed method.
近年来,我们需要更多的带宽来享受视频流、音乐和在线游戏等娱乐内容。为了获得足够的带宽,需要同时使用多个接口来组合带宽的技术。多路径传输协议是一种很有前途的技术,它在传输层将多条路径组合在一起进行分组传输。这样的协议有一种机制,叫做“包调度程序”,用来选择发送包的接口。然而,现有的分组调度研究并没有明确地考虑移动性与带宽绑定的兼容性。因此,当智能手机用户离开无线局域网(LAN)和长期演进(LTE)等通信网络的覆盖范围时,就会出现丢包现象,从而导致吞吐量下降。在本研究中,我们提出了一个数据包调度程序,它可以选择合适的通信路径,以便数据包在移动到覆盖范围之外之前到达对等端。根据车辆的路线和接入点的位置和通信范围,预测通信路径丢失的时间。此外,我们采用MPQUIC (Multipath QUIC (Quick UDP Internet Connections))作为QUIC协议的扩展而提出的多路径传输协议,以减少多路径通信中ACK数据包的丢失,并缩短重新开始传输的时间。我们使用模拟器评估了丢包数、吞吐量和重新开始传输的时间,并证明了所提出方法的优越性。
{"title":"Reachability-Based Packet Scheduler of Multipath QUIC for Heterogeneous Mobile Networks","authors":"Riki Okunishi, R. Teng, Kenya Sato","doi":"10.4236/cn.2022.144011","DOIUrl":"https://doi.org/10.4236/cn.2022.144011","url":null,"abstract":"In recent years, we need more bandwidth to enjoy entertainment contents such as video streaming, music and online gaming. To gain enough bandwidth, technologies that combine bandwidth by using multiple interfaces at same time are desired. Multipath transport protocols which combine multiple paths for packet delivery at the transport layer are a promising technology. Such protocols have a mechanism, called “packet scheduler”, to select the interface to send a packet. However, existing studies of the packet scheduler have not explicitly considered the compatibility of mobility with bonding of bandwidth. Therefore, when smartphone users move out of coverage of communication networks such as wireless Local Area Network (LAN) and Long Term Evolution (LTE) by vehicle, packet loss occurs, leading to a decrease of throughput. In this study, we propose a packet scheduler that selects an appropriate communication path so that packets can reach the peer before it moves out of the coverage. Based on routes of a vehicle and the position and communication range of the access point, the time at which a communication path will be lost is predicted. In addition, we employ MPQUIC (Multipath QUIC (Quick UDP Internet Connections)), which is a multipath transport protocol proposed as the extension of QUIC protocol, to reduce the ACK packet loss in multipath communication, and to reduce the time until the starts of retransmission. We evaluated the number of packet losses, the throughput and the time until starts of retransmission using a simulator and show the superiority of proposed method.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73068029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the modern age, Wireless Body Area Network (WBAN) becomes very popular everywhere for monitoring healthcare services remotely. However, the WBAN system has lagged in efficient power consumption till now. As WBAN is formed with several portable devices, low power consumption will ensure battery lifetime. In this paper, an analysis of Transmission Power Control (TPC) over WBAN has been conducted. A ZigBee based WBAN model with different network topologies and data rates has been proposed in the experiment. WBAN data-management technique has been proposed due to reducing more data transmission. Less data transmission reduces overall power consumption. The whole work has been done using OPNET and OMNET++ network simulators. Six sensor nodes have been used with a ZigBee coordinator in the simulation scenario where throughput, load, delay, data traffic, amount of power consumption, packet delivery ratio, etc. have been used as simulation parameters. TPC analysis indicates the power consumptions in different topologies, with different data rates. Several simulation scenarios were run and the results were analyzed in this paper.
{"title":"Scenario Based Transmission Power Control (TPC) Analysis over Wireless Body Area Network (WBAN)","authors":"T. Arefin, M. Ali, A. Haque","doi":"10.4236/cn.2021.133008","DOIUrl":"https://doi.org/10.4236/cn.2021.133008","url":null,"abstract":"In the modern age, Wireless Body Area Network (WBAN) becomes very popular everywhere for monitoring healthcare services remotely. However, the WBAN system has lagged in efficient power consumption till now. As WBAN is formed with several portable devices, low power consumption will ensure battery lifetime. In this paper, an analysis of Transmission Power Control (TPC) over WBAN has been conducted. A ZigBee based WBAN model with different network topologies and data rates has been proposed in the experiment. WBAN data-management technique has been proposed due to reducing more data transmission. Less data transmission reduces overall power consumption. The whole work has been done using OPNET and OMNET++ network simulators. Six sensor nodes have been used with a ZigBee coordinator in the simulation scenario where throughput, load, delay, data traffic, amount of power consumption, packet delivery ratio, etc. have been used as simulation parameters. TPC analysis indicates the power consumptions in different topologies, with different data rates. Several simulation scenarios were run and the results were analyzed in this paper.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81377994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Microstrip Patch Antenna is a narrowband antenna fabricated by etching the antenna element pattern in metal trace of elements like copper bonded to an insulating dielectric substrate with a continuous metal layer on the opposite side of the substrate which forms a ground plane. Electromagnetic Metamaterial is an artificial material that is made up of different types of structural designs on dielectric substrates. In this paper, a broad and elite investigation is being carried out by designing and simulating a single negative metamaterial cell comprising a square split ring resonator. This metamaterial cell depicts negative values of permeability for a specific range of frequencies. These cells show exceptionally great applications in the design of microstrip patch antenna. The substrate of the microstrip patch antenna with a ground plane is loaded with a square split-ring resonator, Conventional and proposed patch antennas are simulated, analyzed, and reported for performance comparison of its parameters. The proposed edge port feed metamaterial based Rectangular microstrip patch antenna and Circular patch antenna designed at 26 GHz resonance frequency useful for 5G applications. Both antennas are designed on RT Duroid 5880 Substrate with 2.2, dielectric constants. The parameters such as bandwidth, gain and return loss of metamaterial loaded rectangular microstrip patch antenna and Circular patch antenna increases considerably compared to conventional antennas. Comparing parameters of both antennas, the performance of the rectangular microstrip patch antenna is found to be better than circular patch antenna.
{"title":"Edge Port Excited Metamaterial Based Patch Antennas for 5G Application","authors":"P. Satarkar, R. Lohani","doi":"10.4236/CN.2021.133009","DOIUrl":"https://doi.org/10.4236/CN.2021.133009","url":null,"abstract":"Microstrip Patch Antenna is a narrowband antenna fabricated by etching the antenna element pattern in metal trace of elements like copper bonded to an insulating dielectric substrate with a continuous metal layer on the opposite side of the substrate which forms a ground plane. Electromagnetic Metamaterial is an artificial material that is made up of different types of structural designs on dielectric substrates. In this paper, a broad and elite investigation is being carried out by designing and simulating a single negative metamaterial cell comprising a square split ring resonator. This metamaterial cell depicts negative values of permeability for a specific range of frequencies. These cells show exceptionally great applications in the design of microstrip patch antenna. The substrate of the microstrip patch antenna with a ground plane is loaded with a square split-ring resonator, Conventional and proposed patch antennas are simulated, analyzed, and reported for performance comparison of its parameters. The proposed edge port feed metamaterial based Rectangular microstrip patch antenna and Circular patch antenna designed at 26 GHz resonance frequency useful for 5G applications. Both antennas are designed on RT Duroid 5880 Substrate with 2.2, dielectric constants. The parameters such as bandwidth, gain and return loss of metamaterial loaded rectangular microstrip patch antenna and Circular patch antenna increases considerably compared to conventional antennas. Comparing parameters of both antennas, the performance of the rectangular microstrip patch antenna is found to be better than circular patch antenna.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"44 1","pages":"111-129"},"PeriodicalIF":0.0,"publicationDate":"2021-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77349788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Network slicing is one of the most important features in 5G which enables a large variety of services with diverse performance requirements by network virtualization. Traditionally, the network can be viewed as a one-size-fits-all slice and its services are bundled with proprietary hardware supported by telecom equipment providers. Now with the network virtualization technology in 5G, open networking software can be deployed flexibly on commodity hardware to offer a multi-slice network where each slice can offer a different set of network services. In this research, we propose a multi-slice 5G core architecture by provisioning its User Plane Functions (UPFs) with different QoS requirements. We compare the performance of such a multi-slice system with that of one-size-fits-all single slice architecture under the same resource assignment. Our research objective is to compare the performance of a network slicing architecture with that of a “one-size-fits-all” architecture and validate that the former can achieve better performance with the same underlying infrastructure. The results validate that our proposed system can achieve better performance by slicing one UPF into three with proper resource allocation.
{"title":"Evaluation of 5G Core Slicing on User Plane Function","authors":"C. Tsai, F. Lin, Hiroshige Tanaka","doi":"10.4236/cn.2021.133007","DOIUrl":"https://doi.org/10.4236/cn.2021.133007","url":null,"abstract":"Network slicing is one of the most important features in 5G which enables a large variety of services with diverse performance requirements by network virtualization. Traditionally, the network can be viewed as a one-size-fits-all slice and its services are bundled with proprietary hardware supported by telecom equipment providers. Now with the network virtualization technology in 5G, open networking software can be deployed flexibly on commodity hardware to offer a multi-slice network where each slice can offer a different set of network services. In this research, we propose a multi-slice 5G core architecture by provisioning its User Plane Functions (UPFs) with different QoS requirements. We compare the performance of such a multi-slice system with that of one-size-fits-all single slice architecture under the same resource assignment. Our research objective is to compare the performance of a network slicing architecture with that of a “one-size-fits-all” architecture and validate that the former can achieve better performance with the same underlying infrastructure. The results validate that our proposed system can achieve better performance by slicing one UPF into three with proper resource allocation.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79889763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}