Carrier-Grade Mobile Packet Core Network on AWS Best Practices for Designing Carrier-Grade Mobile Packet Core Virtual Network Functions on AWS
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Remote Collaborative Real-Time Multimedia Experience Over The
Remote C ollaborative Real-Time Multimedia Experience over the Future Internet ROMEO Grant Agreement Number: 287896 D4.2 Report on streaming/broadcast techniques for 3D multi-view video and spatial audio ROMEO WP4 Page 1/50 Document description Name of document Report on streaming/broadcast techniques for 3D multi-view video and spatial audio Abstract This document provides a detailed description of the packetization schemes in ROMEO and specifies high level syntax elements of the media formats in order to perform efficient transport and synchronization of the 3D audio and multiview video streams. Adaptation mechanisms and error concealment methods are also proposed in the context of degraded network conditions. Document identifier D4.2 Document class Deliverable Version 1.0 Author(s) N.Tizon, D. Nicholson (VITEC) H. Weigold, H. Ibl, J. Lauterjung (R&S) K. Birkos, A. Kordelas, A. Lykourgiotis, I. Politis (UPAT) Xiyu Shi (MulSys) M.Laabs (IRT) E. Ekmekcioglu (UNIS) A. Akman, S. O. Pelvan, S. Çiftçi, E. Çimen Öztürk (TTA) QAT team D. Doyen (TEC) F. Pascual Blanco (TID) H. Marques (IT) Date of creation 24-Jul-2012 Date of last modification 21-Dec-2012 Status Final Destination European Commission WP number WP4 Dissemination Level Public Deliverable Nature Report ROMEO WP4 Page 2/50 TABLE OF CONTENTS TABLE OF CONTENTS ............................................................................................................. 3 LIST OF FIGURES..................................................................................................................... -
The Internet in Transition: the State of the Transition to Ipv6 in Today's
Please cite this paper as: OECD (2014-04-03), “The Internet in Transition: The State of the Transition to IPv6 in Today's Internet and Measures to Support the Continued Use of IPv4”, OECD Digital Economy Papers, No. 234, OECD Publishing, Paris. http://dx.doi.org/10.1787/5jz5sq5d7cq2-en OECD Digital Economy Papers No. 234 The Internet in Transition: The State of the Transition to IPv6 in Today's Internet and Measures to Support the Continued Use of IPv4 OECD FOREWORD This report was presented to the OECD Working Party on Communication, Infrastructures and Services Policy (CISP) in June 2013. The Committee for Information, Computer and Communications Policy (ICCP) approved this report in December 2013 and recommended that it be made available to the general public. It was prepared by Geoff Huston, Chief Scientist at the Asia Pacific Network Information Centre (APNIC). The report is published on the responsibility of the Secretary-General of the OECD. Note to Delegations: This document is also available on OLIS under reference code: DSTI/ICCP/CISP(2012)8/FINAL © OECD 2014 THE INTERNET IN TRANSITION: THE STATE OF THE TRANSITION TO IPV6 IN TODAY'S INTERNET AND MEASURES TO SUPPORT THE CONTINUED USE OF IPV4 TABLE OF CONTENTS FOREWORD ................................................................................................................................................... 2 THE INTERNET IN TRANSITION: THE STATE OF THE TRANSITION TO IPV6 IN TODAY'S INTERNET AND MEASURES TO SUPPORT THE CONTINUED USE OF IPV4 .......................... 4 -
Army Packet Radio Network Protocol Study
FTD-RL29 742 ARMY PACKET RAHDIO NETWORK PROTOCOL STUDY(U) SRI / I INTERNATIONAL MENLO PARK CA D E RUBIN NOY 77 I SRI-TR-2325-i43-i DRHCi5-73-C-8i87 p UCLASSIFIED F/G 07/2. 1 L '44 .25I MICROCOPY RESOLUTION TFST CHART NAT ONAL BUREAU Cf STINDRES 1% l A I " S2 5 0 0 S _S S S ARMY PACKET RADIO NETWORK PROTOCOL STUDY CA Technical Report 2325-143-1 e November1977 By: Darryl E. Rubin Prepared for: U,S. Army Electronics Command Fort Monmouth, New Jersey 07703 Attn: Mi. Charles Graff, DRDCO-COM-RF-4 Contract DAHC 1 5-73-C-01 87 SRI Project 2325 * 0. The views and conclusions contained in this document are those of author and should not be Interpreted as necessarily representing th Cofficial policies, either expressed or implied, of the U.S. Army or the .LJ United States Government. -. *m 333 Ravenswood Ave. * Menlo Park, California 94025 0 (415) 326-6200 eCable: STANRES, Menlo Park * TWX: 910-373-1246 83 06 '03 . 4qUNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE (When Data Entered) READ INSTRUCTIONS REPORT DOCUMENTATION PAGE BEFORE COMPLETING FORM 1 REPORT NUMBER 2. GOVT ACCESSION NO 3 RECIPIENT'S CATALOG NUMBER [" 2~~1325-143-1 / )r -. : i'/ - 4. TITLE Subtitle) 5-.and TYPE OF REPORT & PERIOD COVERED Army Packet Radio Network Protocol Study Technical Report 6. PERFORMING ORG. REPORT NUMBER 7 AUTHOR(s) A 8 CONTRACT OR GRANT NUMBER(s) Darrvl E. Rubin DAHCI5-73C-0187 9. PERFORMING ORGANIZATION NAME AND ADDRESS 10. PROGRAM ELEMENT, PROJECT. TASK AREA & WORK UNIT NUMBERS SRI International Program Code N. -
NSP Network Services Platform Release 18.6 Glossary
NSP Network Services Platform Release 18.6 Glossary 3HE-14073-AAAB-TQZZA Issue 1 June 2018 NSP Legal notice Nokia is a registered trademark of Nokia Corporation. Other products and company names mentioned herein may be trademarks or tradenames of their respective owners. The information presented is subject to change without notice. No responsibility is assumed for inaccuracies contained herein. © 2018 Nokia. Release 18.6 June 2018 2 3HE-14073-AAAB-TQZZA Issue 1 About this document NSP Glossary 1 About this document 1.1 Purpose The NSP Glossary defines terms, acronyms, and initialisms used in the NSP documentation. Glossary entries that are marked with an asterisk (*) are reproduced with permission from LTE – The UMTS Long Term Evolution: A Pocket Dictionary of Acronyms, © 2009 Stefania Sesia, Issam Toufik, and Matthew Baker, available at http://www.wiley.com/go/sesia_theumts. 1.2 Document support Customer documentation and product support URLs: • Customer Documentation Welcome Page • Technical support • Documentation feedback Release 18.6 June 2018 Issue 1 3HE-14073-AAAB-TQZZA 3 About this document NSP Release 18.6 June 2018 4 3HE-14073-AAAB-TQZZA Issue 1 Glossary NSP Glossary Numerics 10/100/1000Base-FX A networking standard that supports data transfer rates of up to 1000 Mb/s over two optical fibers. 10/100/1000Base-TX An Ethernet technology that supports data transfer rates of up to 1000 Mb/s using twisted-pair copper wire. 10/100Base-TX An Ethernet standard that supports data transfer rates of up to 100 Mb/s using two pairs of data-grade, twisted-pair copper wire. -
Openairinterface Core Network: Recent Enhancements in OAI EPC Beken Dincer, BLACKNED and Gauthier Lionel, EURECOM Outline
OpenAirInterface Core Network: Recent enhancements in OAI EPC Beken Dincer, BLACKNED and Gauthier Lionel, EURECOM Outline . EPC fundamentals . OAI Core Network Overview . Recent developments . OAI Core Network detailed . Future plans 25/06/2019 - - p 1 Outline . EPC fundamentals 3GPP picture of network function and interfaces. Releases and features . OAI Core Network Overview . Recent developments . OAI Core Network detailed . Future plans 25/06/2019 - - p 2 Core Network Fundamentals – Purpose of CN . Evolved Packet Core Network Purpose and history Evolved Packet Core (EPC) is a framework for providing converged voice and data on a 4G Long-Term Evolution (LTE) network. Source http://www.3gpp.org/technologies/keywords-acronyms/100-the-evolved-packet-core 25/06/2019 - - p 3 Core Network Fundamentals . High level functions Network Access Control Functions. – Authentication and authorization, admission control, Policy and charging enforcement Packet Routing and Transfer Functions: IP header compression function, packet screening. Mobility Management Functions. – Reachability management for UE in ECM-IDLE state Security Functions. Radio Resource Management Functions. Network Management Functions (O&M) – GTP-C signaling based Load and Overload Control, Load balancing between MME, MME control of overload, PDN GW control of overload 25/06/2019 - - p 4 Core Network Fundamentals - Architecture 25/06/2019 - - p 5 Core Network Fundamentals – Access Networks WiMax, CDMA2000, WLAN, fixed networks 25/06/2019 - - p 6 Core Network Fundamentals – -
Data Communications & Networks Session 1
Data Communications & Networks Session 1 – Main Theme Introduction and Overview Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences Adapted from course textbook resources Computer Networking: A Top-Down Approach, 5/E Copyright 1996-2009 J.F. Kurose and K.W. Ross, All Rights Reserved 1 Agenda 11 InstructorInstructor andand CourseCourse IntroductionIntroduction 22 IntroductionIntroduction andand OverviewOverview 33 SummarySummary andand ConclusionConclusion 2 Who am I? - Profile - 27 years of experience in the Information Technology Industry, including twelve years of experience working for leading IT consulting firms such as Computer Sciences Corporation PhD in Computer Science from University of Colorado at Boulder Past CEO and CTO Held senior management and technical leadership roles in many large IT Strategy and Modernization projects for fortune 500 corporations in the insurance, banking, investment banking, pharmaceutical, retail, and information management industries Contributed to several high-profile ARPA and NSF research projects Played an active role as a member of the OMG, ODMG, and X3H2 standards committees and as a Professor of Computer Science at Columbia initially and New York University since 1997 Proven record of delivering business solutions on time and on budget Original designer and developer of jcrew.com and the suite of products now known as IBM InfoSphere DataStage Creator of the Enterprise Architecture Management Framework (EAMF) and main -
F5 and the Growing Role of GTP for Traffic Shaping, Network Slicing, Iot, and Security
OVERVIEW F5 and the Growing Role of GTP for Traffic Shaping, Network Slicing, IoT, and Security For years, F5 BIG-IP solutions have managed GPRS Tunneling Protocol (GTP) traffic. Now, in part due to EU regulations, GTP traffic growth is much higher than ever before. International trends show that mobile data is increasing, as is the demand for smart and secure GTP traffic handling. In this document, we will explain GTP, where it is typically used, and where BIG-IP solutions provide significant value. What is GTP? GTP is a group of IP-based communication protocols used to carry General Packet Radio Service (GPRS) within GSM, UMTS, and LTE networks. In 3GPP architectures, GTP and Proxy Mobile IPv6-based interfaces are specified on various interface points. GTP in GPRS (2.5G and 3G) Networks GTP is a set of three separate protocols: GTP Control (GTP-C), GTP User (GTP-U), and GTP Prime (GTP’). GTP-C is used within the GPRS core network for signaling between gateway GPRS support nodes (GGSN) and serving GPRS support nodes (SGSN), as demonstrated by the Gn interface on the diagram below. GTP-C allows the SGSN to activate and deactivate a user’s session, adjust quality- of-service parameters, or update sessions when subscribers arrive from another SGSN. HLR MSC Gr Gs luPS Internet Gi Gn SGSN RNC UMTS Radio Network (RAN) GGSN Gb Corporate SGSN PCU GSM Radio Network Network (BSS) Figure 1: GTP in GPRS (2.5G and 3G networks). OVERVIEW | F5 and the Growing Role of GTP 2 GTP-U carries user data within the GPRS core network, and between the radio access network and core network. -
Leveraging Programmable Dataplanes for a High Performance 5G User Plane Function
Leveraging Programmable Dataplanes for a High Performance 5G User Plane Function Abhik Bose∗ Diptyaroop Maji† Prateek Agarwal Department of Computer Science Department of Computer Science Department of Computer Science & Engineering Indian Institute of & Engineering Indian Institute of & Engineering Indian Institute of Technology Bombay, India Technology Bombay, India Technology Bombay, India abhik@cse:iitb:ac:in diptyaroop@cse:iitb:ac:in prateekag@cse:iitb:ac:in Nilesh Unhale Rinku Shah Mythili Vutukuru‡ Department of Computer Science Department of Computer Science Department of Computer Science & Engineering Indian Institute of & Engineering Indian Institute of & Engineering Indian Institute of Technology Bombay, India Technology Bombay, India Technology Bombay, India nileshunhale@cse:iitb:ac:in rinku@cse:iitb:ac:in mythili@cse:iitb:ac:in ABSTRACT work presents a preliminary implementation towards a com- Emerging 5G applications require a dataplane that has a high prehensive programmable dataplane-accelerated 5G UPF. forwarding throughput and low processing latency, in ad- dition to low cost and power consumption. To meet these CCS CONCEPTS requirements, the state-of-the-art 5G User Plane Functions • Networks ! In-network processing; Programmable (UPFs) are built over high performance packet I/O mech- networks; Network performance analysis; Mobile networks. anisms like the Data Plane Development Kit (DPDK), and further offload some functionality to programmable data- KEYWORDS plane hardware. In this paper, we design and implement 5G core, cellular networks, programmable networks, DPDK several standards-compliant UPF prototypes, beginning with a software-only DPDK-based UPF, progressing to designs ACM Reference Format: which offload different functions to programmable hardware. Abhik Bose, Diptyaroop Maji, Prateek Agarwal, Nilesh Unhale, Rinku Shah, and Mythili Vutukuru. -
5GS Roaming Guidelines Version 3.0 17 November 2020
GSM Association Non-confidential Official Document NG.113 - 5GS Roaming Guidelines 5GS Roaming Guidelines Version 3.0 17 November 2020 This is a Non-binding Permanent Reference Document of the GSMA Security Classification: Non-confidential Access to and distribution of this document is restricted to the persons permitted by the security classification. This document is confidential to the Association and is subject to copyright protection. This document is to be used only for the purposes for which it has been supplied and information contained in it must not be disclosed or in any other way made available, in whole or in part, to persons other than those permitted under the security classification without the prior written approval of the Association. Copyright Notice Copyright © 2020 GSM Association Disclaimer The GSM Association (“Association”) makes no representation, warranty or undertaking (express or implied) with respect to and does not accept any responsibility for, and hereby disclaims liability for the accuracy or completeness or timeliness of the information contained in this document. The information contained in this document may be subject to change without prior notice. Antitrust Notice The information contain herein is in full compliance with the GSM Association’s antitrust compliance policy. V3.0 Page 1 of 49 GSM Association Non-confidential Official Document NG.113 - 5GS Roaming Guidelines Table of Contents 1 Introduction 4 1.1 Overview 4 1.2 Scope 4 2 Definition of Terms and Acronyms 5 2.1 Acronyms 5 2.2 Terms 7 2.3 -
Session 5: Data Link Control
Data Communications & Networks Session 4 – Main Theme Data Link Control Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences Adapted from course textbook resources Computer Networking: A Top-Down Approach, 6/E Copyright 1996-2013 J.F. Kurose and K.W. Ross, All Rights Reserved 1 Agenda 1 Session Overview 2 Data Link Control 3 Summary and Conclusion 2 What is the class about? .Course description and syllabus: »http://www.nyu.edu/classes/jcf/csci-ga.2262-001/ »http://cs.nyu.edu/courses/Fall13/CSCI-GA.2262- 001/index.html .Textbooks: » Computer Networking: A Top-Down Approach (6th Edition) James F. Kurose, Keith W. Ross Addison Wesley ISBN-10: 0132856204, ISBN-13: 978-0132856201, 6th Edition (02/24/12) 3 Course Overview . Computer Networks and the Internet . Application Layer . Fundamental Data Structures: queues, ring buffers, finite state machines . Data Encoding and Transmission . Local Area Networks and Data Link Control . Wireless Communications . Packet Switching . OSI and Internet Protocol Architecture . Congestion Control and Flow Control Methods . Internet Protocols (IP, ARP, UDP, TCP) . Network (packet) Routing Algorithms (OSPF, Distance Vector) . IP Multicast . Sockets 4 Course Approach . Introduction to Basic Networking Concepts (Network Stack) . Origins of Naming, Addressing, and Routing (TCP, IP, DNS) . Physical Communication Layer . MAC Layer (Ethernet, Bridging) . Routing Protocols (Link State, Distance Vector) . Internet Routing (BGP, OSPF, Programmable Routers) . TCP Basics (Reliable/Unreliable) . Congestion Control . QoS, Fair Queuing, and Queuing Theory . Network Services – Multicast and Unicast . Extensions to Internet Architecture (NATs, IPv6, Proxies) . Network Hardware and Software (How to Build Networks, Routers) . Overlay Networks and Services (How to Implement Network Services) . -
Multihop Packet Radio Networks
Congestion Control Using Saturation Feedback for Multihop Packet Radio Networks/ A Thesis Presented to The Faculty of the College of Engineering and Technology Ohio University In Partial Fulfillment of the Requirements for the Degree Master of Science by Donald E. Carter ,.,#'" Novem b er, 1991 Congestion Control Using Saturation Feedback for Multihop Packet Radio Networks DOIlald E. Carter November 19, 1991 Contents 1 The Packet Radio Network 1 1.1 Summary of Packet Radio Protocol 2 1.1.1 Spread Spectrum Transmission 2 1.1.2 Packet Acknowledgement Protocols 4 2 Flow Control to Minimize Congestion 7 2.1 Congestion Control Algorithrns 7 2.1.1 Preallocation of Buffers. 8 2.1.2 Packet Discarding. 8 2.1.3 Isarithmic Congestion Control . 9 2.1.4 Flow Control 9 2.1.5 Choke Packets. 10 2.2 The Adaptive Flow Control Algorithms. 10 2.2.1 Theoretical Limits 011 Throughput with Fixed Trans- mit Probability .................... .. 11 11 2.2.2 Adaptive Transmit Probability 11 2.2.3 Actual Network Throughput .. 12 2.2.4 Minimum Queue Length Routing 13 2.2.5 The Saturation Feedback Algorithm .. 13 2.2.6 Channel Access Protocol for Dedicated Channel Ac- knowledgemcnt with Saturation Feedback 18 3 The MHSS Simulation Model 20 3.1 Modifications to the MHSS Computer Code 21 3.1.1 Modifications to MHSSl.FOR . 21 3.1.2 Modifications to SCHEDULEl.F'OR 22 3.1.3 Modifications to SEND DATA.FOll . 22 3.1.4 Modifications to SEND A(jI{.!;'OR 23 3.1.5 Modifications to PROCj R.X. -
Anomaly Detection in Iot Communication Network Based on Spectral Analysis and Hurst Exponent
applied sciences Article Anomaly Detection in IoT Communication Network Based on Spectral Analysis and Hurst Exponent Paweł Dymora * and Mirosław Mazurek Faculty of Electrical and Computer Engineering, Rzeszów University of Technology, al. Powsta´nców Warszawy 12, 35-959 Rzeszów, Poland; [email protected] * Correspondence: [email protected] Received: 14 November 2019; Accepted: 3 December 2019; Published: 6 December 2019 Abstract: Internet traffic monitoring is a crucial task for the security and reliability of communication networks and Internet of Things (IoT) infrastructure. This description of the traffic statistics is used to detect traffic anomalies. Nowadays, intruders and cybercriminals use different techniques to bypass existing intrusion detection systems based on signature detection and anomalies. In order to more effectively detect new attacks, a model of anomaly detection using the Hurst exponent vector and the multifractal spectrum is proposed. It is shown that a multifractal analysis shows a sensitivity to any deviation of network traffic properties resulting from anomalies. Proposed traffic analysis methods can be ideal for protecting critical data and maintaining the continuity of internet services, including the IoT. Keywords: IoT; anomaly detection; Hurst exponent; multifractal spectrums; TCP/IP; computer network traffic; communication security; Industry 4.0 1. Introduction Network traffic modeling and analysis is a crucial issue to ensure the proper performance of the ICT system (Information and Communication Technologies), including the IoT (Internet of Things) and Industry 4.0. This concept defines the connection of many physical objects with each other and with internet resources via an extensive computer network. The IoT approach covers not only communication devices but also computers, telephones, tablets, and sensors used in the industry, transportation, etc.