2017 International Conference on Information and Communication Technology Convergence (ICTC) 2017
DOI: 10.1109/ictc.2017.8190795
|View full text |Cite
|
Sign up to set email alerts
|

Agile management of 5G core network based on SDN/NFV technology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 2 publications
0
3
0
Order By: Relevance
“…Dexterous administration was as of late evolved by a 5G-based SDN/NFV design and executed in a proof of idea (PoC) for the Pyeongchang Winter Olympics [22]. The accompanying qualities, like openness, area mindfulness, higher organization transmission capacity, and super low dormancy, were of foremost significance in this engineering: It incorporated a few auto-scaling cycles like MANO, MANO/SDN, vEPC, VNFM, and so forth.…”
Section: G Architecturementioning
confidence: 99%
“…Dexterous administration was as of late evolved by a 5G-based SDN/NFV design and executed in a proof of idea (PoC) for the Pyeongchang Winter Olympics [22]. The accompanying qualities, like openness, area mindfulness, higher organization transmission capacity, and super low dormancy, were of foremost significance in this engineering: It incorporated a few auto-scaling cycles like MANO, MANO/SDN, vEPC, VNFM, and so forth.…”
Section: G Architecturementioning
confidence: 99%
“…In addition, an optical network architecture is proposed and investigated in this paper to provide the wired infrastructural needed in 5G networks, and to support NFV and content caching. In the literature, NFV was investigated either in mobile core networks [14]- [16] or in the radio access network [17]- [19] of the mobile network and mostly using pooling of resources such as the work in [20], [21]. In contrast, virtualization in this paper is not limited to a certain part in the mobile network, but is applied in both the mobile core network and the radio access network.…”
Section: Introductionmentioning
confidence: 99%
“…For example, a subset of VNFs may come with location constraints. In this case, some VNFs must be deployed at the reliable and more resource powerful Cloud Computing layer (e.g., video optimization, deep packet inspection [15]), while others need to be instantiated close to the end users at the MEC (e.g., network address translation-NAT, firewall, traffic prioritazion) [4,16].…”
Section: Introductionmentioning
confidence: 99%