2018 Fifth International Conference on Software Defined Systems (SDS) 2018
DOI: 10.1109/sds.2018.8370437
|View full text |Cite
|
Sign up to set email alerts
|

Policy-based network slicing management for future mobile communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 11 publications
0
5
0
1
Order By: Relevance
“…This framework creates and manages the slice up to the user equipment. Alberto et al [40] suggest an information model of NS and a mobility management architecture that integrates SDN/NFV techniques. They introduce inventive components responsible for network slice orchestration and management.…”
Section: ) Ns Management and Life Cycle Management Methodsmentioning
confidence: 99%
“…This framework creates and manages the slice up to the user equipment. Alberto et al [40] suggest an information model of NS and a mobility management architecture that integrates SDN/NFV techniques. They introduce inventive components responsible for network slice orchestration and management.…”
Section: ) Ns Management and Life Cycle Management Methodsmentioning
confidence: 99%
“…Os autores de [5] mostram uma estratégia de otimizac ¸ão através de três modelos complementares baseados em ontologia, como uma extensão do trabalho [6]. As ontologias Network Slice Blueprint e Sub-network Blueprint realizam a traduc ¸ão dos requisitos dos usuários e identificam os recursos que serão alocados, respectivamente.…”
Section: B Estratégias De Alocac ¸ãO De Recursosunclassified
“…In addition, the algorithm reduces the impact of DoS attacks while the performance of the network slice can be retrieved by approximately 98%. Celdran emphet al [173] proposed a policy-based approach to manage the NS in mobile communication. The authors integrated the basic concepts of NFV and NS and defined the network slice ontology.…”
Section: E Security Monitoring -Analytics Data Collection 1) Introduc...mentioning
confidence: 99%
“…In the policy-based security monitoring, several metrics have been used, for instance, packet loss frequency (PktLossFreq), CPU efficiency (CPUEff ), and sustained system performance (SSP). In addition, an automation policy engine is suggested that would trigger the decisions about the management of slices in intra or inter-slice networks [173].…”
Section: E Security Monitoring -Analytics Data Collection 1) Introduc...mentioning
confidence: 99%