2018
DOI: 10.1016/j.comcom.2017.11.007
|View full text |Cite
|
Sign up to set email alerts
|

5G-UHD: Design, prototyping and empirical evaluation of adaptive Ultra-High-Definition video streaming based on scalable H.265 in virtualised 5G networks

Abstract: Ultra-High-Definition (UHD) video applications such as streaming are envisioned as a main driver for the emerging Fifth Generation (5G) mobile networks being developed worldwide. This paper focuses on addressing a major technical challenge in meeting UHD users' growing expectation for continuous high-quality video delivery in 5G hotspots where congestion is commonplace to occur. A novel 5G-UHD framework is proposed towards achieving adaptive video streaming in this demanding scenario to pave the way for self-o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
1
1

Relationship

5
4

Authors

Journals

citations
Cited by 24 publications
(20 citation statements)
references
References 17 publications
0
19
0
1
Order By: Relevance
“…It is a strong limitation when the packets being analyzed have a lot of headers, for example with encapsulated traffic imposed by the Virtual Extensible Local Area Network (VXLAN) and GPRS Tunneling Protocol (GTP) required in 5G infrastructures to support user mobility and multi-tenancy. Salva-Garcia et al [4] and Serrano et al [5] propose the only two software tools which are able to work in a multi-tenant 5G network achieving traffic control over a Edge to Core scenario. However, these contributions do not provide a good scalability mainly due to the use softwarebased architectures proposed with no hardware-acceleration.…”
Section: Related Workmentioning
confidence: 99%
“…It is a strong limitation when the packets being analyzed have a lot of headers, for example with encapsulated traffic imposed by the Virtual Extensible Local Area Network (VXLAN) and GPRS Tunneling Protocol (GTP) required in 5G infrastructures to support user mobility and multi-tenancy. Salva-Garcia et al [4] and Serrano et al [5] propose the only two software tools which are able to work in a multi-tenant 5G network achieving traffic control over a Edge to Core scenario. However, these contributions do not provide a good scalability mainly due to the use softwarebased architectures proposed with no hardware-acceleration.…”
Section: Related Workmentioning
confidence: 99%
“…Mobile Operators are facing an ever growing volume of video in their networks and demanding requirements from their most sophisticated customers for 5G low latency services. Mobile edge applications have been the long promised solution, however, such deployment has always been a challenging task as previous solutions [25], [26] did not provide a simple mechanism for selectively off-loading traffic. One of the main problems identified in the convergence of NFV and 5G is the General Packet Radio Service (GPRS) Tunneling Protocol (GTP) packet handling.…”
Section: Edge Enablermentioning
confidence: 99%
“…Thus, providing a dynamic management and reconfiguration of the system is a feature that very few studies have taken it into account, and even fewer have studied a framework with an automatic control loop for organizing security policies. References [15][16][17] are the only studies in this state of the art where a 5G nested encapsulation has been achieved by using kernel filtering techniques, programmable hardware interfaces, Security and Communication Networks 3…”
Section: Background and Related Workmentioning
confidence: 99%
“…(2) Those interoperable policies are refined and translated-step (2)-into particular low-level configurations according to the format required by the specific filtering agent deployed in the network, such as the one shown in our previous work in the context of the Anastasia project [40] or the one in our previous work in the context of the SELFNET project [15]. 3The Security Orchestrator is notified of the deployment of the rules.…”
Section: Traffic Filtering Process Designmentioning
confidence: 99%