The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile Operators are looking for new ways to cope with ever-increasing data traffic while improving the operational and capital efficiency of their networks. Cloud computing and network function virtualization (NFV) have emerged as key enablers to optimize resource utilization and at the same time reduce network operational expenditure (OPEX). In virtualized networks, network functions are delivered...
Industrial and academic focus in recent years has been shifting towards the Fifth Generation Mobile Networks (5G). In the horizon 2020, the key improvements will rely on technical breakthroughs in the radio access networks, mainly to bring increased bandwidth to the user devices. However, there is still much discussion ongoing about the evolution required in the core network to accommodate increased...
Industrial and academic focus in recent years has been shifting towards the Fifth Generation Mobile Networks (5G). In the horizon 2020, the key improvements will rely on technical breakthroughs in the radio access networks, mainly to bring increased bandwidth to the user devices. However, there is still much discussion ongoing about the evolution required in the core network to accommodate increased...
Network function virtualization is considered as an important shift in the telecommunications and has received huge attention recently. However, efficiently running virtualized services is not trivial, as, among other initialization steps, it requires mapping virtual networks on physical networks. The paper addresses the mobile network virtualization. The objective of the study is to improve the efficiency...
Future 5G deployments will embrace a multitude of novel technologies that will significantly change the air interface, system architecture, and service delivery platforms. However, compared to previous migrations to next-generation technologies, this time the implementation of mobile networks will receive particular attention. The virtualization of network functionality, the application of open, standardized,...
Dynamic network service chaining allows network operators to apply network services to customer traffic on demand and in a highly flexible manner. SDN and particularly OpenFlow-based approaches have been presented that exploit the flexibility and feature richness of OpenFlow for service chaining in data center settings. These systems often use network architectures similar to MPLS, where network traffic...
Network Functions Virtualization (NFV) opens new opportunities and challenges for security community. Unlike existing physical network infrastructure, in a virtualized network platform, security services can be dynamically deployed and maintained to cope with the threat of sophisticated network attacks that are increasing over time. This paper surveys the activity that many security vendors and Internet...
Network Function Virtualization (NFV) promises to transform the way telecom providers design and operate networks and network services. Virtualized Evolved Packet Core (vEPC) is one of the NFV use cases that has got most attention, where dependability is a major concern. In the traditional EPC, functions are deployed in proprietary network elements with proven characteristics, e.g., a defined availability,...
The tremendous growth in mobile and wireless communications comes with more pervasive applications. Current mobile device platform does not allow a local or remote user to attest the target platform. The limitation of using existing software-based protection alone can be easily affected by malicious codes and it cannot assure its own integrity. In this paper, we explore a new approach of anonymity...
Mobile communication has become the dominant branch in the communication business over the last decade and is still rapidly growing in the market. With the recent advances in wireless networks and the exponential growth in the usage of multimedia applications, multi-core platforms point to be the solution of feature-rich phones, such as the iPhone or the BlackBerry Storm to deliver the performance...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.