The current Evolved Packet Core (EPC) 4th generation (4G) mobile network architecture features complicated control plane protocols and requires expensive equipment. Data delivery in the mobile packet core is performed based on a centralized mobility anchor between eNode B (eNB) elements and the network gateways. The mobility anchor is performed based on General Packet Radio Service tunnelling protocol (GTP), which has numerous drawbacks, including high tunnelling overhead and suboptimal routing between mobile devices on the same network. To address these challenges, here we describe new mobile core architecture for future mobile networks. The proposed scheme is based on IP encapsulated within IP (IP-in-IP) for mobility management and data delivery. In this scheme, the core network functions via layer 3 switching (L3S), and data delivery is implemented based on IP-in-IP routing, thus eliminating the GTP tunnelling protocol. For handover between eNB elements located near to one another, we propose the creation of a tunnel that maintains data delivery to mobile devices until the new eNB element updates the route with the gateway, which prevents data packet loss during handover. For this, we propose Generic Routing Encapsulation (GRE) tunnelling protocol. We describe the results of numerical analyses and simulation results showing that the proposed network core architecture provides superior performance compared with the current 4G architecture in terms of handover delay, tunnelling overhead and total transmission delay.
LTE is basically a transition from 3G to 4G mobile networks. This report covers various aspects related to telecommunication sector, LTE basics, working and its applications. Apart from this it also includes technologies such as MIMO, FREQUENCY and TIME DUPLEXING etc.
At present, the global information age has arrived, the total amount of data has exploded, and people's demand for data and information is increasing. The birth of LTE is to continuously optimize wireless communication technology to meet customers' higher requirements for wireless communication.
LTE is a long-term evolution of the UMTS technical standard formulated by the 3GPP organization, in 2004 The project was formally established and launched at the 3GPP Toronto meeting in December.
LTE is a wireless data communication technology standard. The current goal of LTE is to use new technologies and modulation methods to improve the data transmission capacity and data transmission speed of wireless networks, such as new digital signal processing (DSP) technologies, which were mostly proposed around 2000.
The long-term goal of LTE is to simplify and redesign the network architecture to make it an IP-based network, which will help reduce potential undesirable factors in the 3G transition.
LTE technology mainly has two mainstream modes, TDD and FDD, and the two modes have their own characteristics. Among them, FDD-LTE is widely used internationally, while TD-LTE is more common in my country.
The LTE (Long Term Evolution) project is an evolution of 3G, a transition between 3G and 4G technologies, and a global standard of 3.9G.
It has improved and enhanced the 3G air access technology, using OFDM and MIMO as the only standard for its wireless network evolution. It provides a peak rate of 100 Mbit/s for downlink and 50 Mbit/s for uplink under a 20MHz spectrum bandwidth, which improves the performance of cell-edge users, increases cell capacity, and reduces system delay.
In order to better understand LTE, we have listed 41 basic knowledge of LTE for your reference.
3GPP SON Series: Inter-Cell Interference Coordination (ICIC)3G4G
This SON tutorial is part of the 3GPP Self-Organizing Networks series (#3GPPSONSeries). In this part we will look at what is meant by Inter-Cell Interference Coordination (ICIC) and how does the standard define the mechanism to help erase it. We will also look at some of the basic algorithms used for ICIC.
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
LTE is basically a transition from 3G to 4G mobile networks. This report covers various aspects related to telecommunication sector, LTE basics, working and its applications. Apart from this it also includes technologies such as MIMO, FREQUENCY and TIME DUPLEXING etc.
At present, the global information age has arrived, the total amount of data has exploded, and people's demand for data and information is increasing. The birth of LTE is to continuously optimize wireless communication technology to meet customers' higher requirements for wireless communication.
LTE is a long-term evolution of the UMTS technical standard formulated by the 3GPP organization, in 2004 The project was formally established and launched at the 3GPP Toronto meeting in December.
LTE is a wireless data communication technology standard. The current goal of LTE is to use new technologies and modulation methods to improve the data transmission capacity and data transmission speed of wireless networks, such as new digital signal processing (DSP) technologies, which were mostly proposed around 2000.
The long-term goal of LTE is to simplify and redesign the network architecture to make it an IP-based network, which will help reduce potential undesirable factors in the 3G transition.
LTE technology mainly has two mainstream modes, TDD and FDD, and the two modes have their own characteristics. Among them, FDD-LTE is widely used internationally, while TD-LTE is more common in my country.
The LTE (Long Term Evolution) project is an evolution of 3G, a transition between 3G and 4G technologies, and a global standard of 3.9G.
It has improved and enhanced the 3G air access technology, using OFDM and MIMO as the only standard for its wireless network evolution. It provides a peak rate of 100 Mbit/s for downlink and 50 Mbit/s for uplink under a 20MHz spectrum bandwidth, which improves the performance of cell-edge users, increases cell capacity, and reduces system delay.
In order to better understand LTE, we have listed 41 basic knowledge of LTE for your reference.
3GPP SON Series: Inter-Cell Interference Coordination (ICIC)3G4G
This SON tutorial is part of the 3GPP Self-Organizing Networks series (#3GPPSONSeries). In this part we will look at what is meant by Inter-Cell Interference Coordination (ICIC) and how does the standard define the mechanism to help erase it. We will also look at some of the basic algorithms used for ICIC.
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
White Paper: Dynamic TDD for LTE-a (eIMTA) and 5GEiko Seidel
LTE, which was originally designed with fixed FDD or TDD modes with little flexibility for varying the capacity split between uplink and downlink, is being augmented with features that allow for more flexible use of radio resources. One of these features is “enhanced Interference Mitigation and Traffic Adaptation” (eIMTA) which notably allows for very dynamic adaptation of the TDD pattern e.g. in response to varying capacity requirements in uplink and downlink. eIMTA was standardized in LTE-A Release 12 and eIMTA-like functionality is considered to be one of the key enablers for 5G technologies. The purpose of this paper therefore is to shed some light on eIMTA, its main characteristics and capabilities and to illustrate its behaviour by means of system-level simulations.
Overview 5G Architecture Options from Deutsche TelekomEiko Seidel
At 3GPP RAN#72 5G Architecture discussion took place. This document lists all options that are under discussion.
Source: RP-161266 at RAN#72 Deutsche Telekom
Beginners: Different Types of RAN Architectures - Distributed, Centralized & ...3G4G
In this basic tutorial we look at different types of RAN architectures that are always being discussed. We start with the Distributed RAN (D-RAN) and then look at Centralized and Cloud RAN (both referred to as C-RAN) architectures. We also quickly look at RAN functional splits for 5G and then tie this all together.
We also look at how Samsung and Nokia discuss these architectures in the context of 5G.
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
Open RAN Page: https://www.3g4g.co.uk/OpenRAN/
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
I AM SUDANESE,MASTER OF TELECOM FROM SUDAN UNEVERSITY ,THIS IS MY DOCUMENT I INVESTIGATE IN LTE WITH MORE THAN 50 REFERENCE , GOD BLESS US ,PLEASE FEEL FREE TO ASK ABOUT ANY THING IN THIS TOPIC
MY EMAIL khalidaam2015@hotmail,khalidaa@sudatel.sd
دعواتكم لى وللوالدين ولاهلى , الحمد لله فبنعمته تتم الصالحات اللهم احفظ الدول الاسلامية من كل كيد واغدق عليهم الرخاء
Presented by Andy Sutton, Principal Network Architect - Chief Architect’s Office, TSO, BT at IET "Towards 5G Mobile Technology – Vision to Reality" seminar on 25th Jan 2017
Shared with permission
Part 7: 3GPP Roadmap - 5G for Absolute Beginners3G4G
An introductory training on 5G for newbies available on Udemy - http://bit.ly/udemy5G
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
Presented virtually by Andy Sutton, Principal Network Architect, BT Technology on 06 Aug 2020.
Andy provides an update and review of the transformational plans, capabilities and outcomes from 5G deployments in the UK. 5G networks are already enabling a step change in the range and capability of innovative applications from IoT to robotics. That pace of change is due to accelerate as 5G moves from its initial enhanced mobile broadband phase to deliver ultra-reliable and low latency communications along with massive machine type connectivity.
*** SHARED WITH PERMISSION ***
3GPP Newsletter: Status 5G Architecture Study in 3GPP SA2Eiko Seidel
The System and Service Aspects – Architecture group (SA2) of 3GPP has a dedicated study item for the study of the next generation networks. It is expected that this work will form the basis of the system architecture for the future 5G networks. Within SA2 group, regular meetings and discussions are held to discuss the progress of this study item. NoMoR Research follows these activities. This report presents a condensed summary of the earlier mentioned study item, including the latest updates from the most recent meeting held in Vienna, Austria from 11th – 14th July, 2016.
An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in...IJCNCJournal
Coupling cellular communication networks with vehicular ad hoc networks (VANET) can be a very interesting way out for providing Internet access to vehicles in the road. However, due to the several specific characteristics of VANETs, making an efficient multi-hop routing from vehicular sources to the Internet gateways through Long Term Evolution (LTE) technology is still challenging. In this paper, an Internet mobile gateway selection scheme is proposed to elect more potential vehicles to behave as gateways to Internet in VANETs. Therefore, the discovery and the selection of route to those mobiles gateways is carried out via an efficient multiple metrics-based relay selection mechanism. The objective is to select the more reliable route to the mobile gateways, by reducing the communication overhead and performing seamless handover. The proposed protocol is compared with one recent protocol based on packet delivery ratio, average end-to-end delay and overhead. The results show that the proposed protocol ameliorates significantly the network performance in the contrast of the other protocol.
AN EFFICIENT MOBILE GATEWAY SELECTION AND DISCOVERY BASED-ROUTING PROTOCOL IN...IJCNCJournal
Coupling cellular communication networks with vehicular ad hoc networks (VANET) can be a very
interesting way out for providing Internet access to vehicles in the road. However, due to the several
specific characteristics of VANETs, making an efficient multi-hop routing from vehicular sources to the
Internet gateways through Long Term Evolution (LTE) technology is still challenging. In this paper, an
Internet mobile gateway selection scheme is proposed to elect more potential vehicles to behave as
gateways to Internet in VANETs. Therefore, the discovery and the selection of route to those mobiles
gateways is carried out via an efficient multiple metrics-based relay selection mechanism. The objective is
to select the more reliable route to the mobile gateways, by reducing the communication overhead and
performing seamless handover. The proposed protocol is compared with one recent protocol based on
packet delivery ratio, average end-to-end delay and overhead. The results show that the proposed protocol
ameliorates significantly the network performance in the contrast of the other protocol.
White Paper: Dynamic TDD for LTE-a (eIMTA) and 5GEiko Seidel
LTE, which was originally designed with fixed FDD or TDD modes with little flexibility for varying the capacity split between uplink and downlink, is being augmented with features that allow for more flexible use of radio resources. One of these features is “enhanced Interference Mitigation and Traffic Adaptation” (eIMTA) which notably allows for very dynamic adaptation of the TDD pattern e.g. in response to varying capacity requirements in uplink and downlink. eIMTA was standardized in LTE-A Release 12 and eIMTA-like functionality is considered to be one of the key enablers for 5G technologies. The purpose of this paper therefore is to shed some light on eIMTA, its main characteristics and capabilities and to illustrate its behaviour by means of system-level simulations.
Overview 5G Architecture Options from Deutsche TelekomEiko Seidel
At 3GPP RAN#72 5G Architecture discussion took place. This document lists all options that are under discussion.
Source: RP-161266 at RAN#72 Deutsche Telekom
Beginners: Different Types of RAN Architectures - Distributed, Centralized & ...3G4G
In this basic tutorial we look at different types of RAN architectures that are always being discussed. We start with the Distributed RAN (D-RAN) and then look at Centralized and Cloud RAN (both referred to as C-RAN) architectures. We also quickly look at RAN functional splits for 5G and then tie this all together.
We also look at how Samsung and Nokia discuss these architectures in the context of 5G.
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
Open RAN Page: https://www.3g4g.co.uk/OpenRAN/
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
I AM SUDANESE,MASTER OF TELECOM FROM SUDAN UNEVERSITY ,THIS IS MY DOCUMENT I INVESTIGATE IN LTE WITH MORE THAN 50 REFERENCE , GOD BLESS US ,PLEASE FEEL FREE TO ASK ABOUT ANY THING IN THIS TOPIC
MY EMAIL khalidaam2015@hotmail,khalidaa@sudatel.sd
دعواتكم لى وللوالدين ولاهلى , الحمد لله فبنعمته تتم الصالحات اللهم احفظ الدول الاسلامية من كل كيد واغدق عليهم الرخاء
Presented by Andy Sutton, Principal Network Architect - Chief Architect’s Office, TSO, BT at IET "Towards 5G Mobile Technology – Vision to Reality" seminar on 25th Jan 2017
Shared with permission
Part 7: 3GPP Roadmap - 5G for Absolute Beginners3G4G
An introductory training on 5G for newbies available on Udemy - http://bit.ly/udemy5G
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
Presented virtually by Andy Sutton, Principal Network Architect, BT Technology on 06 Aug 2020.
Andy provides an update and review of the transformational plans, capabilities and outcomes from 5G deployments in the UK. 5G networks are already enabling a step change in the range and capability of innovative applications from IoT to robotics. That pace of change is due to accelerate as 5G moves from its initial enhanced mobile broadband phase to deliver ultra-reliable and low latency communications along with massive machine type connectivity.
*** SHARED WITH PERMISSION ***
3GPP Newsletter: Status 5G Architecture Study in 3GPP SA2Eiko Seidel
The System and Service Aspects – Architecture group (SA2) of 3GPP has a dedicated study item for the study of the next generation networks. It is expected that this work will form the basis of the system architecture for the future 5G networks. Within SA2 group, regular meetings and discussions are held to discuss the progress of this study item. NoMoR Research follows these activities. This report presents a condensed summary of the earlier mentioned study item, including the latest updates from the most recent meeting held in Vienna, Austria from 11th – 14th July, 2016.
An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in...IJCNCJournal
Coupling cellular communication networks with vehicular ad hoc networks (VANET) can be a very interesting way out for providing Internet access to vehicles in the road. However, due to the several specific characteristics of VANETs, making an efficient multi-hop routing from vehicular sources to the Internet gateways through Long Term Evolution (LTE) technology is still challenging. In this paper, an Internet mobile gateway selection scheme is proposed to elect more potential vehicles to behave as gateways to Internet in VANETs. Therefore, the discovery and the selection of route to those mobiles gateways is carried out via an efficient multiple metrics-based relay selection mechanism. The objective is to select the more reliable route to the mobile gateways, by reducing the communication overhead and performing seamless handover. The proposed protocol is compared with one recent protocol based on packet delivery ratio, average end-to-end delay and overhead. The results show that the proposed protocol ameliorates significantly the network performance in the contrast of the other protocol.
AN EFFICIENT MOBILE GATEWAY SELECTION AND DISCOVERY BASED-ROUTING PROTOCOL IN...IJCNCJournal
Coupling cellular communication networks with vehicular ad hoc networks (VANET) can be a very
interesting way out for providing Internet access to vehicles in the road. However, due to the several
specific characteristics of VANETs, making an efficient multi-hop routing from vehicular sources to the
Internet gateways through Long Term Evolution (LTE) technology is still challenging. In this paper, an
Internet mobile gateway selection scheme is proposed to elect more potential vehicles to behave as
gateways to Internet in VANETs. Therefore, the discovery and the selection of route to those mobiles
gateways is carried out via an efficient multiple metrics-based relay selection mechanism. The objective is
to select the more reliable route to the mobile gateways, by reducing the communication overhead and
performing seamless handover. The proposed protocol is compared with one recent protocol based on
packet delivery ratio, average end-to-end delay and overhead. The results show that the proposed protocol
ameliorates significantly the network performance in the contrast of the other protocol.
TECHNIQUES FOR OFFLOADING LTE EVOLVED PACKET CORE TRAFFIC USING OPENFLOW: A C...IJCNCJournal
Cellular users of today have an insatiable appetite for bandwidth and data. Data-intensive applications, such as video on demand, online gaming and video conferencing, have gained prominence. This, coupled with recent innovations in the mobile network such as LTE/4G, poses a unique challenge to network
operators in how to extract the most value from their deployments while reducing their Total Cost of Operations(TCO). To this end, a number of enhancements have been proposed to the “conventional” LTE mobile network. Most of these recognize the monolithic and non-elastic nature of the mobile backend and propose complimenting core functionality with concepts borrowed from Software Defined Networking
(SDN). In this paper, we will attempt to explore some existing options within the LTE standard to address traffic challenges. We then survey some SDN-enabled alternatives and comment on their merits and drawbacks.
Rapidly IPv6 multimedia management schemes based LTE-A wireless networksIJECEIAES
Ensuring the best quality of smart multimedia services becomes an essential goal for modern enterprises so there is always a need for effective IP mobility smart management schemes in order to fulfill the following two main functions: (I) interconnecting the moving terminals around the extended indoor smart services. In addition, (II) providing session continuity for instant data transfer in real-time and multimedia applications with negligible latency, efficient bandwidth utilization, and improved reliability. In this context, it found out that the Generalized Multi-Protocol Label Switching (GMPLS) over LTE-A network that offers many advanced services for large numbers of users with higher bandwidths, better spectrum efficiency, and lower latency. In GMPLS, there is an elimination of the routing searches and choice of routing protocols on every core LTE-A router also it provides the architecture simplicity and increases the scalability. A comparative assessment of three types of IPv6 mobility management schemes over the LTE-A provided by using various types of multimedia. By using OPNET Simulator 17.5, In accordance with these schemes, it was proven that the IPv6-GMPLS scheme is the best choice for the system's operation, in comparison to the IPv6-MPLS and Mobile IPv6 for all multimedia offerings and on the overall network performance.
Comparative analysis of LTE backbone transport techniques for efficient broad...TELKOMNIKA JOURNAL
In the bid to bring about a solution to the nagging problem associated with the provision of
ubiquitous broadband access, Next Generation Network (NGN) popularly referred to as Long Term Evolution
(LTE) network with appropriate network integration technique is recommended as solution. Currently,
Internet Protocol/Multi-Protocol Label Switching (IP/MPLS) is the transport technique in LTE backbone
infrastructure. This technique, however, suffers significantly in the event of failure of IP path resulting in delay
and packet loss budgets across the network. The resultant effect is degradation in users quality of service
(QoS) experience with real-time services. A competitive alternative is the Internet Protocol/Asynchronous
Transfer Mode (IP/ATM). This transport technique provides great dynamism in the allocation of bandwidth
and supports varying requests of multimedia connections with diverse QoS requirements. This paper,
therefore, seeks to evaluate the performance of these two transport techniques in a bid to establish
the extent to which the latter technique ameliorates the aforementioned challenges suffered by the previous
technique. Results from the simulation show that the IP/ATM transport scheme is superior to the IP/MPLS
scheme in terms of average bandwidth utilization, mean traffic drop and mean traffic delay in the ratio of 9.8,
8.7 and 1.0% respectively.
Improvement in the mobility of mobile ipv6 based mobile networks using revers...ijmnct
Mobile IPv6 based Mobile Networks are becoming increasingly important with the widespread
popularity of wireless internet connectivity. For large networks, an extension, namely, the Hierarchical
Mobile IPv6 is used, which suffers from overloading of the Home Agent as every packet sent has to pass
through it and this produces a significant loss in performance. In this paper, a method to improve the
mobility using the fast handover of Mobile IPv6 (FMIPv6) and the Reverse Routing Header Protocol is
proposed. Simulation results at different packet intervals show that, the proposed scheme is able to
reduce the average delay and achieve an optimum level of throughput.
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architectureijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP preservation and optimal data path management according to application needs. A functional setup validates and assays the proposed evolution in terms of inter-system handover preparation, interruption and completion time relative to control plane delay requirements of the 5G networks.
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of
managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP preservation and optimal data path management according to application needs. A functional setup validates and assays the proposed evolution in terms of inter-system handover preparation, interruption
and completion time relative to control plane delay requirements of the 5G networks.
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP
preservation and optimal data path management according to application needs. A functional setup
validates and assays the proposed evolution in terms of inter-system handover preparation, interruption and completion time relative to control plane delay requirements of the 5G networks.
An Efficient Machine Learning Optimization Model for Route Establishment Mech...IJCNCJournal
Internet of Things (IoT) provides interconnection of various wireless communication devices, which offers both ubiquitous accessibility of devices and in-built intelligence capacity. IoT offers interaction with devices and provides sufficient capability advantages of networking and socialization with consideration of intermediate devices. RPL (Routing Protocol for low-power and Lossy Networks) is an attractive model for effective routing techniques in the wireless medium. The increase in demand for wireless systems in terms of energy, reliability, stability, and scale routing IPv6 over 6L0WPAN is being adopted. This research developed an optimized machine learning model (WOABC) routing protocol for route establishment in IoT networks. The constructed RPL routing protocol incorporates an optimization approach for the identification of the best and worst routes in the network. The proposed WOABC evaluates the routing path for data transmission between nodes through optimization techniques for effective route establishment. The optimization of routes is performed with whale optimization techniques. The developed whale optimization technique is incorporated in machine learning networks. Also, the proposed WOABC utilizes an optimization membership function for the identification of the optimal path in the network. The performance of the proposed WOABC is compared with existing techniques such as RPL and Speed – IoT. The comparative analysis showed that the performance of the proposed WOABC is ~3% increased throughput. The performance of the proposed WOABC is significant compared with the existing RPL routing protocol.
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...IJCNCJournal
Internet of Things (IoT) provides interconnection of various wireless communication devices, which offers
both ubiquitous accessibility of devices and in-built intelligence capacity. IoT offers interaction with
devices and provides sufficient capability advantages of networking and socialization with consideration of
intermediate devices. RPL (Routing Protocol for low-power and Lossy Networks) is an attractive model for
effective routing techniques in the wireless medium. The increase in demand for wireless systems in terms
of energy, reliability, stability, and scale routing IPv6 over 6L0WPAN is being adopted. This research
developed an optimized machine learning model (WOABC) routing protocol for route establishment in IoT
networks. The constructed RPL routing protocol incorporates an optimization approach for the
identification of the best and worst routes in the network. The proposed WOABC evaluates the routing path
for data transmission between nodes through optimization techniques for effective route establishment. The
optimization of routes is performed with whale optimization techniques. The developed whale optimization
technique is incorporated in machine learning networks. Also, the proposed WOABC utilizes an
optimization membership function for the identification of the optimal path in the network. The
performance of the proposed WOABC is compared with existing techniques such as RPL and Speed – IoT.
The comparative analysis showed that the performance of the proposed WOABC is ~3% increased
throughput. The performance of the proposed WOABC is significant compared with the existing RPL
routing protocol.
Towards achieving-high-performance-in-5g-mobile-packet-cores-user-plane-functionEiko Seidel
White Paper Intel SK Telekom
This paper presents the architecture for a user plane function (UPF) in the mobile packet core (MPC) targeting 5G deployments.
Design and development of handover simulator model in 5G cellular network IJECEIAES
In the modern era of technology, the high speed internet is the most important part of human life. The current available network is reckoned to be slow in speed and not be up to snuff for data transmission regarding business applications. The objective of handover mechanism is to reassign the current session handle by internet gadget. The globe needs the next generation high mobility and throughput performance based internet model. This research paper explains the proposed method of design and development for handover based 5G cellular network. In comparison to the traditional method, we propose to control the handovers between base-stations using a concentric method. The channel simulator is applied over the range of the frequencies from 500 MHz to 150 GHz and radio frequency for the 700 MHz bandwidth. The performance of the simulation system is calculated on the basis of handover preparation and completion time regarding base station as well as number of users. From this experiment we achieve the 7.08 ms handover preparation time and 9.98 ms handover completion time. The author recommended the minimum handover completion time, perform the high speed for 5G cellular networks.
AN ADAPTIVE DIFFSERV APPROACH TO SUPPORT QOS IN NETWORK MOBILITY NEMO ENVIRON...IJCNCJournal
Network Mobility Basic Support (NEMO BS) protocol (RFC 3963) is an extension of Mobile IPv6. The NEMO BS embraced by IETF working group to permit any node in the portable network to be accessible to the Internet despite the fact the network itself is roaming. This protocol likewise Mobile IPv6 doesn’t deliver any kind of Quality of Service (QoS) guarantees to its clients. It can barely offer the same level of services (i.e. Best-Effort) to all the users without obligation to the application’s needs. This propositions a challenge to real-time applications that demand a precise level of QoS pledge. The Differentiated Services has recently come to be the most widely used QoS support technology in IP networks due to its relative simplicity and scalability benefits. This paper proposes a new scheme to provide QoS to mobile network nodes within NEMO context. The proposed scheme intends to reduce handover latency for the users of MNN as well as alleviates packet losses. The feasibility of the proposed enhancement is assessed by measuring its performance against the native NEMO BS standard protocol using NS-2 simulator. The obtained results in the simulation study have demonstrated that the proposed scheme outperforms the standard NEMO BS protocol.
PERFORMANCE COMPARISON OF PACKET SCHEDULING ALGORITHMS FOR VIDEO TRAFFIC IN L...ijmnct
In this paper we have studied downlink packet scheduling algorithms proposed for LTE cellular networks.
The study emphasize on three most promising scheduling algorithms such as: FLS, EXP rule and LOG rule.
The performance of these three algorithms is conducted over video traffic in a vehicular environment using
LTE-Sim simulator. The simulation was setup with varying number of users from 10 - 60 in fixed bounded
regions of 1 km radius. The main goal this study is to provide results that will help in the design process of
packet scheduler for LTE cellular networks, aiming to get better overall performance users. Simulation
results show that, the FLS scheme outperforms in terms of average system throughput, average packet
delay, PLR; and with a satisfactory level of fairness index.
Long term evolution (LTE) is replacing the 3G services slowly but steadily and become a preferred choice
for data for human to human (H2H) services and now it is becoming preferred choice for voice also. In
some developed countries the traditional 2G services gradually decommissioned from the service and
getting replaced with LTE for all H2H services. LTE provided high downlink and uplink bandwidth
capacity and is one of the technology like mobile ad hoc network (MANET) and vehicular ad hoc network
(VANET) being used as the backbone communication infrastructure for vehicle networking applications.
When Compared to VANET and MANET, LTE provides wide area of coverage and excellent infrastructure
facilities for vehicle networking. This helps in transmitting the vehicle information to the operator and
downloading certain information into the vehicle nodes (VNs) from the operators server. As per the ETSI
publications the number of machine to machine communication (MTC) devices are expected to touch 50
billion by 2020 and this will surpass H2H communication. With growing congestion in the LTE network,
accessing the network for any request from VN especially during peak hour is a big challenge because of
the congestion in random access channel (RACH). In this paper we will analyse this RACH congestion
problem with the data from the live network. Lot of algorithms are proposed for resolving the RACH
congestion on the basis of simulation results so we would like to present some practical data from the live
network to this issue to understand the extent RACH congestion issue in the real time scenario.
Efficient addressing schemes for internet of thingsIJECEIAES
The internet of things (IoT) defines the connectivity of physical devices to provide the machine to machine communication. This communication is achieved through various wireless standards for sensor node connectivity. The IoT calls from the formation of various wireless sensor nodes (WSNs) in a network. The existing neighborhood discovery method had the disadvantage of time complexity to calculate the cluster distance. Our proposed method rectifies this issue and gives accurate execution time. This paper proposed mobility management system based on proxy mobile IPv6 as distributed PMIPv6 with constrained application protocol (CoAP-DPMIP) and PMIPv6 with constrained application protocol (CoAP-PMIP). It also provides the optimized transmission path to reduce the delay handover in IoT network. The PMIPv6 described the IPv6 address of mobile sensor device for efficient mobility management. The network architecture explains three protocol layers of open systems interconnection model (OSI model). The OSI layers are data link layer, network layer and transport layer. We have proposed the distance estimation algorithm for efficient data frames transmission. This paper mainly focuses the secure data transmission with minimum loss of error. The evaluation result proved that proposed technique performance with delay, energy, throughput and packet delivery ratio (PDR). Also, it measures the computational time very effectively.
Similar to A FUTURE MOBILE PACKET CORE NETWORK BASED ON IP-IN-IP PROTOCOL (20)
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
A FUTURE MOBILE PACKET CORE NETWORK BASED ON IP-IN-IP PROTOCOL
1. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.5, September 2018
DOI: 10.5121/ijcnc.2018.10505 83
A FUTURE MOBILE PACKET CORE NETWORK
BASED ON IP-IN-IP PROTOCOL
Mohammad Al Shinwan1
and Kim Chul-Soo2
1
Faculty of Computer Science and Informatics, department of Mobile Computing,
Amman Arab University, Amman, Jordan.
2
Department of Computer Engineering, Inje University, Gimhae, Republic of Korea.
ABSTRACT
The current Evolved Packet Core (EPC) 4th generation (4G) mobile network architecture features
complicated control plane protocols and requires expensive equipment. Data delivery in the mobile packet
core is performed based on a centralized mobility anchor between eNode B (eNB) elements and the
network gateways. The mobility anchor is performed based on General Packet Radio Service tunnelling
protocol (GTP), which has numerous drawbacks, including high tunnelling overhead and suboptimal
routing between mobile devices on the same network. To address these challenges, here we describe new
mobile core architecture for future mobile networks. The proposed scheme is based on IP encapsulated
within IP (IP-in-IP) for mobility management and data delivery. In this scheme, the core network functions
via layer 3 switching (L3S), and data delivery is implemented based on IP-in-IP routing, thus eliminating
the GTP tunnelling protocol. For handover between eNB elements located near to one another, we propose
the creation of a tunnel that maintains data delivery to mobile devices until the new eNB element updates
the route with the gateway, which prevents data packet loss during handover. For this, we propose Generic
Routing Encapsulation (GRE) tunnelling protocol. We describe the results of numerical analyses and
simulation results showing that the proposed network core architecture provides superior performance
compared with the current 4G architecture in terms of handover delay, tunnelling overhead and total
transmission delay.
KEYWORDS
5G network, mobile core network, IP-in-IP, GRE
1. INTRODUCTION
In recent years, the marked increase in the use of smart phones and other mobile devices has led
to huge growth in wireless mobile communication data traffic. This trend appears likely to
continue, and Cisco forecasts that the volume of mobile data traffic will increase eight-fold
between 2015 and 2020 [1]. This growth in mobile data traffic places increasing demands on
wireless communication systems, and represents a major challenge for cellular providers in terms
of upgrading their core networks to accommodate future network requirements and keeping up
with increasing customer demand.
One of the greatest challenges for future mobile communication networks is how to design and
build 5th generation (5G) mobile networks. The need for new network architecture is essential to
support growth in demand for broadband services of various kinds delivered over the networks,
and to support the Internet of Things (IoT) services and applications [2].
Many approaches have been proposed to address the growth in data traffic on mobile networks,
including device-to-device communication and radio resource management. However, these
efforts have focused mainly on increasing the capacity of wireless radio links. The future mobile
network consists of two main parts: a radio link and a non-radio mobile core network. Effective
design of both the radio link and the mobile core is required to meet the requirements of the
future mobile network [3].
2. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.5, September 2018
84
The current 4th generation (4G) core network termed the Evolved Packet Core (EPC) is based on
the General Packet Radio Service tunnelling protocol (GTP) [4]. With EPC, eNodeB (eNB)
elements establish GTP tunnels with serving gateways (SGWs) and Packet Data Network (PDN)
gateways (PGWs) to create centralized mobility anchors for data packet forwarding. However,
the 4G network has a number of limitations. First, there are load balance and latency issues.
Growth in data traffic requires a reduction in the transmission and connection delays. Simplifying
the mobile core and reducing the number of identifications can make mobile core networks
simpler and more efficient, and hence more cost-effective. The second problem is suboptimal
routing. With current 4G networks, the uplink and downlink data packets are routed via mobility
anchors, which often results in the suboptimal paths. For example, a data instead of taking the
shortest path, the packet is routed via a PGW and an SGW. The Third is the GTP tunnelling
protocol overhead. GTP protocol adds three headers to the data payload totalling 36 bytes; i.e.,
GTP,
User Datagram Protocol (UDP) and IP. In addition, the use of GTP protocol and mobility anchors
means that the full functionality of packet switching cannot be exploited, the result being that
circuit switching is favoured over packet switching. Fourth is the required capital expenditure.
The EPC network is simply not cost-effective, due to the huge number of routers that are required
to support the core network.
2. LITERATURE REVIEW
A variety of schemes have been proposed to overcome these issues. The Distributed Mobility
Management (DMM) scheme proposed by the Internet Engineering Task Force [5] provides
mobility solutions with localized mobility anchors that are distributed within the network, in
combination with centralized anchors, where the system is arranged in a hierarchical model. This
was proposed to optimize routing for local data traffic, and reduces delays due to the shorter
distances to local servers [6]. A mobility data offloading approach using femtocells has been
proposed to enhance the 4G network [7]. In this scheme, data traffic is forward to the mobile
device without using the mobile core network, which reduces the volume of internet traffic and
unwanted data flow into the mobile core network.
Another approach to distributing mobility in 4G networks is the Ultra Flat Architecture (UFA).
The key element of UFA is to decrease the number of the network nodes to one (i.e., a single base
station), based on the distribution of user and control plane roles in the node. UFA provides
improved performance and seamless handover [8]. In [9] and [10], the authors proposed a new
mobile network architecture for 5G networks termed 5G-TPC. This architecture was based on the
Transparent Interconnection of Lots of Links (TRILL) protocol, and was designed to use link
layer routing bridges rather than GTP protocol.
3. METHODOLOGY
Most existing (including previously proposed) architectures suffer from problems associated with
mobility anchoring and GTP overhead. Moreover, from the perspective of capital expenditure,
most of the proposed mobile network architectures are not cost-effective. This is because the
core network is based on routers. Here we propose to use layer 3 switching (L3S), which has
significant advantages both in terms of cost and performance, provides high performance and can
handle several different routing protocols, including Open Shortest Path First (OSPF),
Intermediate System to Intermediate System (IS-IS) and Routing Information Protocol (RIP) [11].
Layer 3 switches are cheaper than routers, and can exploit the advantages of layers 2 and 3.
In this paper, we also propose a new architecture for the future mobile core network, termed
ICNA (IP-in-IP Core Network Architecture). The proposed scheme is based on IP encapsulated
within IP (IP-in-IP) [12], and aims to eliminate the GTP tunnelling overhead and simplify the
3. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.5, September 2018
85
mobile packet core between the eNB and PGW. The proposed approach also eliminates the
legacy centralized mobility anchor through the use of distributed data traffic and data routing
within the mobile network using layer 3 switches, and exploits the full functionality of packet
switching in the mobile core network. The approach entails the use of two IP addresses: an inner
IP address for the user equipment (UE) identifier, and an outer IP address for the eNB or PGW
identifier.
For handover between eNBs located near to one another, we propose the use of a tunnel to
maintain data flow to mobile devices until the new eNB updates the route with the gateway. In
this manner, we prevent data packet loss during handover. For this, we propose Generic Routing
Encapsulation (GRE) tunnelling protocol.
The remainder of the paper is organized as follows. Section 2 reviews the 4G mobile core
network architecture. Section 3 describes the proposed ICNA scheme, and gives an overview of
the handover process. In Section 4, we compare the 4G network with the proposed ICNA network
via a numerical analysis, and give a performance evaluation. Section 5 concludes the paper.
4. MOBILITY MANAGEMENT IN 4G NETWORKS
System Architecture Evolution (SAE) [13] is the non-radio core architecture of Long Term
Evolution (LTE) networks developed by 3GPP. It is an evolution of the General Packet Radio
Service (GPRS) network, and aims to support low latency, high throughput and mobility between
multi-heterogeneous networks. The most important component of the SAE architecture is the
EPC. EPC networks are formed of several functional entities, namely PGWs, SGWs, Mobility
Management Entities (MMEs), Home Subscriber Servers (HSSs), and Policy and Charging Rules
Function (PCRF) servers. PGWs provide mobile users with access to a PDN by allocating IP
addresses, and also provide IP routing and forwarding; SGWs act as local mobility anchors for
inter-eNB handover; MMEs provide several functions, including mobility management and
handover management; HSSs provide user profiles and authentication data; and PCRF controls
the charging rules and quality of service [19].
In an EPC network, data paths are established between eNBs and PGWs via SGWs, and use GTP
for tunnelling. PGWs and SGWs behave as centralized mobility anchors for data packets;
consequently, all data traffic is forward through a centralized anchor SGW and PGW.
As shown in Figure (1), the EPC architecture is composed of several interfaces for data
forwarding, including X2, S1-MME, S11, S5 and S1-U. The X2 interface protocol supports UE
mobility by creating a GTP tunnel between eNBs. S1-MME provides the initial UE context to
MMEs, and is also responsible for establishing and controlling the GTP tunnel between MMEs
and SGWs. S5 provides GTP tunnel functionality between SGWs and PGWs. The S1-U interface
provides GTP tunnel function between eNBs and SGWs.
Figure (2) shows the protocol stack for data delivery based on GTP. When the UE sends a data
packet, the eNB adds IP/UDP/GTP headers. GTP protocol is used for data that flows between
eNBs, SGWs and PGWs. When a PGW receives a data packet, it removes all GTP headers, and
then forwards the packet to the Internet host.
4. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.5, September 2018
86
Figure 1. The Evolved Packet Core (EPC) model for 4th generation (4G) mobile networks.
The data delivery process in the 4G network is shown in Figures (3) and (4). The UE sends a
packet to a PGW via an eNB and an SGW. The PGW receives the data packet and determines the
location of the destination from its database. PGW determines whether the destination is within
the same mobile network or is outside of it, and then forwards the data packet to the destination.
Figure 2. The protocol stack for data delivery in a 4G network.
Figure 3. Data delivery from a UE to the Internet.
5. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.5, September 2018
87
Figure 4. Data delivery from a user equipment (UE) to another UE.
Figure 5. The initial attach procedure in a 4G network.
Figure (5) shows the initial attach registration procedure for a 4G network. When the UE
establishes radio link synchronization with an eNB, the UE creates a connection for data delivery
via an Attach Request message sent to the eNB. The eNB then forwards the attach request to an
MME, which sends an Update Location Request to an HSS. The HSS responds via an Update
Location Answer, and then the MME performs the required security related-operations with UE.
The MME sends a Create Session Request to an SGW to create a transmission path. The SGW
now sends a Modify Bearer Request to a PGW, which response by sending a Modify Bearer
Response message. The SGW then sends a Create Session Response to the MME, and the MME
sends an Attach Accept message to the UE. The MME now performs an Initial Context Setup
with the eNB, and the eNB sends an Initial Context Setup Response message to the MME. The
UE then sends an Attach Complete message to the MME, which sends a Modify Bearer Request
to the SGW, which response by sending a Modify Bearer Response message to the MME.
There are two types of handover process in a 4G network: X2 handover with SGW relocation,
and S1 handover with SGW relocation. Figure (6) shows a X2 handover with SGW relocation.
When the UE moves to another eNB region, the source eNB sends a Handover Request to the
target eNB, which response with a Handover Acknowledgment (step 1). The target eNB then
sends a Path Switch Request to the MME (step 2), which sends a Create Session Request to the
SGW (step 3). The SGW exchanges modify bearer messages with the PGW via a Modify Bearer
Request and a Modify Bearer Response (step4), and then sends a Create Session Response to the
MME (step 5), which sends a Path Switch Response to the target eNB (step 6). Finally, the MME
sends a Release Resources message to the source eNB (step 7).
6. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.5, September 2018
88
Figure 6. X2 handover with serving gateway (SGW) relocation.
Figure (7) shows the S1 handover with SGW relocation. When the UE moves to a new domain,
the source eNB sends a Handover required message to the MME (step 1). The MME then sends a
Handover Request to target eNB (step 2), which response with a Handover Acknowledgment
(step 3). The MME then sends a Handover Command to the source eNB (step 4), which sends a
Handover Notify message to the MME (step 5). The MME sends a Modify Bearer Request to the
target SGW (step 6), which exchanges modify bearer messages with the PGW via a Modify
Bearer Request and a Modify Bearer Response (step 7). The target SGW sends a Modify Bearer
Response to the MME (step 8), which then sends a Release Resources message to the source eNB
(step 9).
5. PROPOSED NETWORK ARCHITECTURE
5.1. Network Model
Figure (8) shows an overview of the proposed ICNA network. Each base station (BS) functions
based on layer 3 routing, as does the Cellular Gateway (CGW) for Internet hosts. Layer 3
switches are used for packet delivery in the mobile packet core. For UE identification, an inner IP
address (i.e., the original IP address) will be located by the User Control Entity (UCE). The outer
IP address of the BS is used as a location reference for the UE. UCE with HSS is used for UE
registration and to obtain subscription information on the UE. UCE with HSS is also used to
register the UCE ID and indicate in which UCE the UE is located. The CGW is located between
the mobile packet core and the Internet.
Figure 7. S1 handover with SGW relocation.
7. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.5, September 2018
89
Figure 8. The proposed IP encapsulated within IP (IP-in-IP) packet core for future mobile networks.
The link state protocols OSPF and IS-IS are used for routing in the mobile backhaul, as specified
by Cisco for L3S [11]. The full functionality of packet switching networks can therefore be
exploited for the link state protocol of the communication system. The GRE tunnelling is used for
connection between BSs, and provides support for handover between BSs, preventing packet loss
during handover.
5.2. Comparison of 4G and ICNA
Table 1 lists the main characteristics of the existing 4G network architecture and the proposed
network architecture. With 4G, data delivery uses the GTP protocol, whereas ICNA uses IP-in-IP
based on L3S. With 4G, the tunnel endpoint identifier (TEID) of GTP is used as a locator,
whereas the outer IP address is used as a locator with ICNA. With 4G, GTP/UDP/IP headers are
used for data packet encapsulation for creating GTP tunnel, whereas ICNA uses IP-in-IP
encapsulation for data delivery. For UE handover, with 4G the GTP tunnels are re-established
between PGWs and eNBs via an SGW.
However, with ICNA, when the UE moves to a new location, information on the UE is updated
by the UCE, including the new outer IP address (i.e., new BS IP address). With 4G networks,
GTP tunnelling via SGW and PGW determines the data path; thus, data packets may follow
suboptimal paths, including the data path between UEs in the same mobile network, as well as
between the PGW and UE. With ICNA, however, the data path will be optimal because data
packets are forwarded directly between switches using routing protocols.
5.3. IP-in-IP Protocol Stack for Data Delivery
Figure (9) shows IP-in-IP protocol stacks for data delivery with communication between a UE
and an Internet host. Here IP-in-IP is shown between a BS and a CGW. The radio interface
between the BS and UE uses RLC and PDCP protocols. BS encapsulates the IP address of the UE
as an inner IP address with an IP-in-IP packet using the outer IP address (i.e., the IP address of
the CGW). The switches forward data packets in the mobile core network from the BS to the
Internet access point (i.e., CGW). As shown in Figure (10), the outer IP address is used for
delivery by the mobile packet core.
Table 1. Comparison of 4G and ICNA
8. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.5, September 2018
90
Figure 9. The IP-in-IP protocol stack used for data delivery to the Internet.
Figure 10. IP-in-IP switching for data delivery to from user equipment (UE) to an Internet host.
Figure 11. The IP-in-IP protocol stack used for data delivery to UE.
Figure 12. The IP-in-IP switching used for data delivery to from user equipment to UE.
Figure (11) shows the protocol stack and IP-in-IP switching used for communication between two
UEs in the same mobile network (UE1 and UE2). Here UE1 is connected to BS1 and UE2 is
connected to BS2, and data access between the UEs and the BSs is via RLC and PDCP protocols.
When BS1 receives a Packet Send Request from UE1 to obtain the address of BS2, BS1 will
encapsulate the original packet with the IP address of BS2. The packet is then forwarded to BS2
via switches, and BS2 de-encapsulates the packet, extracts the inner IP address, and sends it to
UE2. Figure (12) shows how the inner and outer IP addresses are used for packet delivery
between UE1 and UE2.
9. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.5, September 2018
91
5.4. Initial Attach Procedure
Figure (13) shows the initial attach registration procedure used with ICNA. When the UE
establishes radio link synchronization with the BS, the UE sends an Attach Request message to
the BS (step 1). The BS then sends the Attach Request to the UCE, which sends an
Authentication Information to the HSS, as well as a Network Attach Storage (NAS) request. Once
these authentications and NAS security procedures are accomplished, the UCE sends an Update
Location Request to the HSS, which indicates in which UCE the UE is located. The HSS
responds by sending an Update Location Answer (step 2).
In step (3), the UCE sends a request to the CGW to allocate a gateway address for the UE via
exchange of Gateway Allocation Request and Gateway Allocation Response messages. An IP
address is then allocated to the UE by the BS via exchange of an IP Allocation Request and an IP
Allocation Response (step 4). Following the allocation of the IP address and establishment of a
gateway, the UCE responds to the BS with an Attach Accept message, which contains the IP
addresses of the BS and the IP (i.e., the outer and inner IP addresses). The BS then sends an
Attach Accept message to the UE (step 5), and the UE sends an Attach Complete message to the
BS (step 6).
5.5. Data Delivery Procedures
Once the initial attach process has been completed, the UE can send and receive data packets.
Data delivery in ICNA is categorized as either mobile host to Internet host, mobile host to mobile
host, or Internet host to mobile host.
5.5.1. Mobile Host to Internet Host
Figure (14) shows the data delivery procedure for data transfer from a mobile host to an Internet
host. First, the UE sends a data packet to the BS, which identifies whether or not the destination
belongs to the same mobile network by checking the IP address space. Where the destination IP
address is outside of the mobile network, the BS encapsulates the data packet with the IP address
of the CGW, and then forwards it to the CGW, which de-encapsulates the data packet, and
extracts the inner IP address. The CGW then forwards the data packet to the Internet host using
standard routing protocols.
Figure 13. The initial attach procedure.
Figure 14. The data delivery procedure for data transfer from a mobile host to Internet host.
10. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.5, September 2018
92
5.5.2. Mobile Host to Mobile Host
Figure (15) shows the data delivery procedures for data transfer between mobile hosts within the
same mobile network. First, UE1 sends a data packet to BS1 with the destination IP address. BS1
then queries the IP address of BS2 from the UCE, which replies with the address of BS2. BS1 then
encapsulates the data packet with the IP address of BS2. When BS2 receives the data packet, it de-
encapsulates the packet to extract the inner IP, and the packet is delivered to UE2.
5.5.3. Internet Host to Mobile Host
Figure (16) shows the data delivery procedure for data transfer from an Internet host to a mobile
host. When the Internet host sends a data packet to a UE, the CGW receives the data packet using
standard routing protocols. The CGW then queries UCE to determine the IP address of the BS
that destination UE is registered on, and the UCE replies with the IP address of the BS. The CGW
then encapsulates the data packet using this IP address (as the outer IP address). The data packet
is then forwarded to the destination BS, which de-encapsulates the packet, and delivers it to the
UE.
5.6 Handover
In ICNA a mobile network based on IP-in-IP, handover scenarios are classified as either inter-
gateway handover or intra-gateway handover.
5.6.1. Inter-gateway Handover
Inter-gateway handover occurs between a source BS and a target BS when the UE moves but
remains within the same domain. With this operation, there is the risk of data packet loss. When
the UE moves to the target BS, the source BS still receives data packets from the CGW. To
bridge this gap, these two BSs communicate with each other directly via GRE tunneling protocol
[14]. This supports handover and prevents data packet loss during the handover process.
Figure 15. The data delivery procedure for data transfer from a mobile host to another mobile host.
Figure 16. The data packet delivery procedure for data transfer from an Internet host to a mobile host.
11. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.5, September 2018
93
Fig. 17 shows how the source BS establishes a GRE tunnel with the target BS to exchange data.
During this process, the UE continues to receive data packets from the source BS until handover
to the target BS has been completed.
Fig. 18 shows the protocol stack for BSs connected via a GRE tunnel. A unique GRE tunnel is
generated for each UE, and each tunnel is identified by a unique key, this key is shared between
the BSs.
Fig. 19 shows the handover procedure, during which the UE moves from the source BS to the
target BS. The source BS sends a Handover Request to the target BS, which response with a
Handover Acknowledgment, thereby establishing a GRE tunnel (step 1). The target BS sends a
Path Switch Request to the UCE (step 2.a), and the UCE sends a Path Switch Response to the
target BS (step 2.b). The UCE then sends a Path Modify Request to the CGW to inform the CGW
that the UE has moved to a new BS, and the CGW sends a Path Modify Response to the UCE
(step 3). Finally, the target BS sends a Release Resources message to the source BS, which
releases the GRE tunnel.
Figure 17. Establishment of a Generic Routing Encapsulation (GRE) tunnel between a source base station
(BS) and a target BS.
Figure 18. The GRE protocol packet stack for BSs connected via a GRE tunnel.
Figure 19: Inter-gateway handover process.
12. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.5, September 2018
94
Figure 20. Intra-gateway handover process.
5.6.2. Intra-gateway Handover
Fig. 20 shows the intra-gateway handover process, whereby the UE moves to a different domain.
During handover, the UE will move from a source BS to a target BS. The source BS will send a
Handover required message to the UCE (step 1.a), which sends a Handover Request to the target
BS (step 2.a). The target BS responds via a Handover Acknowledgment (step 2.b), and the UCE
sends a Handover Command to the source BS (step 1.b). The UCE then sends a Modify Bearer
Request to the CGW (step 3), which response with a Modify Bearer Response. Finally, the UCE
sends a Release Resources message to the source BS (step 4).
6. NUMERICAL ANALYSIS
6.1. Total Transmission Delay
We calculated the total transmission delay for a centralized 4G architecture and the distributed
ICNA architecture. We determined the transmission delay of a message with size S that was sent
between two nodes over a wireless link and a wired link [9].
We denote the transmission delay of a message with size S sent via a wireless link from x to y as
T(x-y)(S), which can be expressed as follows: Tx-y(S) = [(1-q)/(1+q)] × [S/Bwl + Lwl]. We denote the
transmission delay of the message with size S sent via a wired link from x node to y node as Tx-
y(S,Hx-y), where Hx-y represents the number of wired hops between x and y. Tx-y(Hx-y) can be
expressed as follows: Tx-y(S,Hx-y) = Hx-y × [(S/Bw) + Lw + Tq]. In the performance analysis, we
used the notation and default parameter values listed in Table 2.
Table 2 Default parameter values.
13. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.5, September 2018
95
6.1.1. 4G Network
With a 4G network, the initial attach procedure is as follows. When a UE enters an eNB region,
the UE attempts to join the network by sending an Attach Request to the MME. This procedure
requires an amount of time TUE MME = TUE eNB(Sc) + Tγ(Sc). The MME registers the subscriber
information and updates its location with the HSS via Update Location Request messages, and the
HSS responds with an Update Location Answer. This procedure requires an amount of time 2 ×
Tδ (Sc). The MME now sends a Create Session Request to the SGW, which requires an amount of
time Tϵ (Sc).
The SGW establishes an EPS session with the PGW via a Modify Bearer Request, and the PGW
responds with a Modify Bearer Response. This requires an amount of time 2 × Tβ (Sc). The SGW
then responds to the MME via a Create Session Response, which requires an amount of time Tϵ
(Sc).
The MME performs the attach accept process with the UE by sending an Attach Accept message.
This procedure requires an amount of time TMME UE = Tc (Sc) + TeNB UE (Sc). The MME then
sends an initial context message to the eNB by exchanging Initial Context Setup Request an
Initial Context Response messages. This process requires an amount of time 2 × Tλ(Sc). The UE
then sends an Attach Complete message to the MME. This procedure requires an amount of time
TUE MME = TUE eNB (Sc) + Tγ (Sc). Finally, the MME sends a Modify Bearer Request to the
SGW, which response with a Modify Bearer Response. This procedure requires an amount of
time 2 × Tϵ (Sc). For data delivery, data packets are sent from the UE to the eNB, which then
sends the packets to the SGW. The SGW forwards the data packets to the PGW. The total
transmission delay of the 4G network is given by
TTD4G = 4 TUE eNB (Sc) + 5 Tγ (Sc) + 2Tδ (Sc) + 4Tϵ (Sc)
2Tβ (Sc) + 2T UE eNB (Sd) + 2Tϵ (Sd)+ 2Tβ (Sd) (1)
6.1.2. ICNA Network
With the ICNA network, the initial attach procedure is as follows. When the UE enters a BS
region, it attempts to join the network by sending an Attach Request to the UCE. This procedure
requires an amount of time TUE UCE = TUE BS (Sc) + Tγ (Sc). The UCE registers the subscriber
information and updates its location with the HSS by sending an Update Location Request, and
the HSS responds with an Update Location Answer. This procedure requires an amount of time 2
× Tδ (Sc). The UCE then sends a Gateway Allocation Request to the CGW, which response by
sending a Gateway Allocation Response. This procedure requires an amount of time 2 × Tϵ (Sc).
The BS requests IP address allocation from the UCE by exchanging IP Allocation Request and IP
Allocation Response messages. This procedure requires an amount of time 2 × Tγ (Sc). The UCE
then performs the attach accept procedure with the UE, and then sends an Attach Accept message
to the UE. This procedure requires an amount of time TUCE UE = Tγ(Sc) + TBS UE (Sc). The UE
now sends an Attach Complete message to UCE, which requires an amount of time TUE UCE =
TUE BS (Sc) + Tγ(Sc). For data delivery, the data packets sent from the UE to the BS are then sent
to the CGW. Thus, the total transmission delay for ICNA is as follows:
TTDICNA = 3TUE BS (Sc) + 5T γ (Sc) + 2Tδ (Sc) +2Tϵ (Sc)
+ 2T UE BS (Sδ) + 2Tα (Sd) (2)
14. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.5, September 2018
96
6.2. Handover Delay
6.2.1. Handover Delay in a 4G Network
a) X2 Handover with S-GW relocation
In a 4G network, when the UE moves to another eNB region, the source eNB sends a Handover
Request to the target eNB, which response with a Handover Acknowledgment. The target eNB
then sends a Path Switch Request to the MME, which sends a Create Session Request to the
SGW. The SGW exchanges modify bearer information with the P-GW via Modify Bearer
Request and Modify Bearer Response messages. The SGW then sends a Create Session Response
to the MME, which sends a Path Switch Response to the target eNB. Finally, the MME sends a
Release Resources message to source the eNB. The total X2 handover delay of the 4G network is
as follows:
XHD4G = 2Tλ + 3Tγ + 2 Tϵ + 2Tβ (3)
b) S1 handover with S-GW relocation
With S1 handover, when the UE moves to a different domain, the source eNB sends a Handover
required message to the MME, which in turn sends a Handover Request to the target eNB. The
target eNB respond with a Handover Acknowledgment, and then the MME sends a Handover
Command to the source eNB. The target eNB sends a Handover Notify message to MME, which
sends a Modify Bearer Request to the target SGW. The SGW exchanges modify bearer messages
with the PGW via Modify Bearer Request and Modify Bearer Response. The target SGW then
sends a Modify Bearer Response to MME, which sends a Release Resources request to the source
eNB. The S1 handover delay of 4G (SHD4G) is as follows:
SHD4G = 6Tλ + 2Tϵ + 2Tβ (4)
6.2.2. Handover in ICNA Network
a) Inter-gateway handover
With inter-gateway handover, when the UE moves to another BS region, the source BS sends a
Handover Request to the target BS, which response with a Handover Acknowledgment. The target
BS sends a Path Switch Request to the UCE, which sends a Path Modify Request to the CGW.
The CGW sends a Path Modify Response to the UCE, which sends a Path Switch Response to the
target BS. Finally, the target BS sends a Release Resources message to the source BS. We obtain
the inter-gateway handover delay of ICNA network as follows:
IGHDICNA = 3Tλ + 2Tγ + 2Tϵ (5)
b) Intra-gateway handover
With intra-gateway handover, when the UE moves to a different domain, the source BS sends a
Handover required message to the UCE, which sends a Handover Request to the target BS. The
target BS responds by sending a Handover Acknowledgment and the UCE then sends a Handover
Command to the source BS. The UCE also sends a Modify Bearer Request to the CGW, which
response via a Modify Bearer Response. Finally, the UCE sends a Release Resources request to
the source BS. We obtain the intra-gateway handover delay of an ICNA network as follows:
IAGHDICNA = 5Tγ + 2Tϵ (6)
6.3. Data Tunneling Overhead
With GTP used in 4G mobile networks, data packets are encapsulated with three headers: an 8-
byte GTP header, an 8-byte UDP header, and a 20-byte IP header, which totals 36 bytes [15]. In
15. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.5, September 2018
97
an ICNA network, the data packets are encapsulated with a 12-byte outer IP header and a 20-byte
inner IP header, which totals 32 bytes. Furthermore, with an ICNA network, GRE tunneling
protocol is used for handover between eNBs, whereby data packets are encapsulated with an 8-
byte GRE header and a 20-byte IP header, which totals 28 bytes. We may therefore obtain the
data tunneling overheads of a 4G network (DTO4G), an ICNA network (DTOICNA), and a GRE
protocol (DTOGRE) as follows:
6.4. Numerical Results
Based on the mathematical relationships given above, we may compare the performance of the
existing 4G network architecture with that of the proposed ICNA architecture. Table 2 lists the
default values of the delay parameters, which were taken from Ref. [16].
6.4.1. Total transmission delay
Figure (21) shows the total transmission delay as a function of the average queuing delay at each
network node, Tq. The total transmission delay increased linearly as Tq increased for both
networks. This shows that the 4G network results in worse performance than the ICNA network.
This is because the PGW implements data packet delivery to the SGW in the 4G network,
whereas data packets are delivered via the optimal path with the ICNA network.
Figure (22) shows the total transmission delay as a function of the wireless link delay, Lwl. For
both networks, the total transmission delay increased linearly as Lwl increased. Again, the ICNA
network resulted in superior performance to that of the 4G network. Figure (23) shows the effects
of the hop count between the eNB and MME. Varying γ had a significant effect on the
transmission delay of the 4G network. This is because data packets are routed via a centralized
anchor, such as SGW and MME. However, with the ICNA network, the total delay was not
significantly affected by γ, since data packets were delivered between the CGW and the BS via an
optimized route.
16. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.5, September 2018
98
Figure 21. The effect of the queuing delay at each node.
Figure 22. The effect of the wireless link delay Lwl.
17. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.5, September 2018
99
Figure 23. The effect of varying γ on the total transmission delay.
6.4.2. Handover delay
Figure (24) shows a comparison of inter-gateway handover between an ICNA and X2 handover
with S-GW relocation in a 4G network. This comparison is based on varying the hop count λ
between eNBs in the same domain. Varying λ had a greater impact on the handover delay for the
4G network. This is because the MME modifies the bearer via a centralized anchor (SGW/PGW),
whereas the ICNA is largely insensitive to λ because the UCE performs path modification with
the CGW.
Figure (25) shows a comparison of intra-gateway handover between an ICNA with S1 handover
with S-GW relocation in a 4G network. This comparison was based on the hop count γ between
the eNB and MME. Varying c had a significant impact on the handover delay for the 4G network;
this is because the MME implements modify bearer with the PGW via the SGW. By contrast,
with the ICNA network, the UCE performs path switching directly with CGW.
6.4.3. Data Tunnelling Overhead
Figure (26) and (27) show comparisons between 4G and ICNA networks in terms of the data
tunneling overhead. Figure (26) shows the data tunneling overhead for various payload sizes for
the 4G GTP protocol and the ICNA protocol. The payload size significantly affected the data
tunneling overhead for both network protocols. This is because the GTP protocol encapsulates the
payload using three headers (GTP/UDP/IP), totaling 36 bytes, and the ICNA network protocol
encapsulates the payload using two headers (outer IP and inner IP), totaling 32 bytes.
Figure (27) shows a comparison of GTP with the GRE protocol, which is used to support
handover between BSs. The payload significantly affected the data tunneling overhead for both
protocols. This is because the headers that are added to the payload total 28 bytes with the GRE
protocol and 36 bytes with GTP.
18. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.5, September 2018
100
Figure 24. The effect of λ on the handover delay.
Figure 25. The effect of γ on the handover delay.
Figure 26. The effect of Sd on the data tunneling overhead (General Packet Radio Service tunneling
protocol [GTP] vs. IP-in-IP).
19. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.5, September 2018
101
Figure 27. The effect of Sd on the data tunneling overhead (GTP vs. GRE).
7. SIMULATION RESULTS
We evaluate the performance of the proposed model by using NS-3 simulation. For 4G network
many simulations have been proposed i.e. LTE/EPC Network Simulator (LENA) project [17]. We
rebuild the current LENA simulation as described in [18]. Besides, we used the implementation
previously described to run an ICNA simulation. NS-3 version 3.22 in Linux environment has
been used. The programming of proposed ICNA consists of building BS, UCE, CGW and L3S.
Control plane and data plane implementing into the corresponding interface. IP-in-IP protocol
implemented in the core network. A remote host node is created to acts as an Internet server,
which is able to send packets to other nodes. The rest of the simulation parameters are configured
as shown in the table (3).
Table 3 simulation key values
This simulation builds to measure the performance between the 4G network and the proposed
schema as a following: time for data delivery between the mobile host and Internet host, time for
data delivery between a mobile host in the same network and Intra-gateway handover.
Figure (28) shows the total latency of initial attachment and data delivery from the mobile host to
an Internet host. The total transmission delay increased linearly for both networks. This shows
that the 4G network results in worse performance than the ICNA network. This is because the
PGW implements data packet delivery to the SGW in the 4G network, whereas data packets are
delivered via the optimal path with the ICNA network.
Figure (29) shows a comparison of the handover delay between an ICNA and X2 handover with
S-GW relocation in a 4G network. This comparison is based on the number of eNBs in the same
domain. The simulation shows a greater impact on the handover delay for the 4G network. This is
because the MME modifies the bearer via a centralized anchor (SGW/PGW), whereas the ICNA
is largely insensitive to handover delay because the UCE performs path modification with the
CGW.
20. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.5, September 2018
102
Figure 28. Comparison of 4G and proposed ICNA in term of latency of initial attachment and data delivery
from mobile host to Internet
Figure 29. Comparison of 4G and proposed ICNA in term of latency of Handover
8. CONCLUSIONS
The current 4G mobile packet core (i.e., EPC) is inflexible and expensive. We have described an
ICNA network architecture, which is based on IP-in-IP protocols for data packet delivery. With
this architecture, the mobile packet core nodes function as layer 3 switches, and data packets are
delivered between eNBs and PDN gateways via routing protocols.
ICNA achieves better performance than 4G in three ways. First, it eliminates the GTP tunneling
protocol and using IP-in-IP protocols. Second, there is no centralized mobility anchor because the
data traffic is distributed on the network core. Third, the ICNA protocol is more efficient than 4G
because the core network is based on L3S.
We compared our ICNA architecture with the existing 4G network architecture using numerical
analyses and simulation. The results show that the ICNA architecture results in better
performance than the 4G network in terms of the total transmission delay, the handover delay and
the data tunneling overhead.
REFERENCES
[1] Cisco, (2016) “Visual Networking Index: Global Mobile Data Traffic Forecast Update”, 2015 - 2020,
White paper.
[2] Ericsson, Huawei and Qualcomm, (2015) “The Road to 5G: Drivers, Applications, Requirements and
Technical Development”, Technical Report.
[3] Shinwan, M.A. and Chul-Soo, K. (2017) “Enhanced Mobile Packet Core Network Scheme for
Next-Generation Mobile Communication Systems”. International Journal of Electronics
Communication and Computer Engineering (IJECCE), 8, 56-61.
[4] 3GPP TS 23.002, (2016) “Technical Specification Group Services and System Aspects; Network
architecture”, Technical Report, Rel-13 Ver. 13.5.0.
21. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.5, September 2018
103
[5] Seite,P., P. Bertin, (2010) “Dynamic Mobility Anchoring”, IETF.
https://tools.ietf.org/html/draft-seite-netext-dma-00
[6] D. Liu, P. Seite, H. Yokota and J. Korhonen, (2014) “Requirements for distributed mobility
management”, IETF RFC 7333, https://doi.org/10.17487/rfc7333.
[7] F. Rebecchi, M. Dias de Amorim, V. Conan, A. Passarella, R. Bruno and M. Conti, (2015)” Data of
loading Techniques in Cellular Networks: A Survey”. IEEE Communications Surveys and Tutorials,
vol. 17, no. 2, pp. 580-603. https://doi.org/10.1109/comst.2014.2369742.
[8] K. Daoud, P. Herbelin and N. Crespi. (2015) UFA: Ultra Flat Architecture for high bitrate services in
mobile networks. IEEE 19th International Symposium on Personal, Indoor and Mobile Radio
Communications, pp.1-6. https://doi.org/10.1109/pimrc.2008.4699577.
[9] Gohar, M., Choi, JG. & Koh, SJ, (2016) “TRILL-Based Mobile Packet Core Network for 5G Mobile
Communication Systems”. Wireless Pers Commun. volume 87, issue 1, (p.p 125 – 144),
https://doi.org/10.1007/s11277-015-3035-5.
[10] Heeyoung Jung, Moneeb Gohar and Seok-Joo Koh, (2014) “RB-core: Routing bridge-based 5G
mobile core network”, International Conference on Information and Communication Technology
Convergence (ICTC), (pp.223-228), https://doi.org/10.1109/ictc.2014.6983122.
[11] Cisco, “Catalyst 2948G-L3 Switch High-Performance Layer 3 Switching”, Technical Report.
http://www.cisco.com/en/US/products/hw/switches/ps606/products_data_sheet09186a008009267f.ht
ml
[12] Perkins, Charles, “IP encapsulation within IP”, (2003) IETF RFC 2003,
https://doi.org/10.17487/rfc2003.
[13] 3gpp.TS 23.401, (2016) “General Packet Radio Service (GPRS) enhancements for Evolved Universal
Terrestrial Radio Access Network (EUTRAN) access”, Rel-13, Ver.13.6.1.
[14] S. Hanks, T. Li, D. Farinacci, P. Traina. (1994) “Generic routing encapsulation (GRE)”, IETF RFC
2784, https://doi.org/10.17487/rfc1701.
[15] Nuutti Varis, Jukka Manner and Johanna Heinonen., (2011) “A layer-2 approach for mobility and
transport in the mobile backhaul”, ITS Telecommunications (ITST), 2011 11th International
Conference, (pp.268-273), https://doi.org/10.1109/itst.2011.6060066.
[16] C. Makaya and S. Pierre. (2008) An Analytical Framework for Performance Evaluation of IPv6-
Based Mobility Management Protocols. IEEE Transactions on Wireless Communications, vol. 7, no.
3, pp. 972-983. https://doi.org/10.1109/twc.2008.060725.
[17] Ns-3 Open Source Network Simulator. https://www.nsnam.org/
[18] M. A. Shinwan, T.-D. Huy, and K. Chul-Soo, (2017) “A Flat Mobile Core Network for Evolved
Packet Core Based SAE Mobile Networks,” Journal of Computer and Communications, vol. 05, no.
05, pp. 62-73.
[19] B. Davaasambuu, F. Semaganga, and T. Sato, (2015) “Adaptive Handover Hysteresis and Call
Admission Control for Mobile Relay Nodes,” International journal of Computer Networks &
Communications, vol. 7, no. 6, pp. 87–98.
AUTHORS
Mohammad Al Shinwan, received his B.S degree in Computer Science from Al al-Bayt
university, Jordan, in 2009 and the master degree in 2013 from the institute of Mathematical
and Computer Science, University of Sindh in Pakistan. He received a Ph.D. in Computer
Networks from Inje University, Korea. He is currently an assistant professor in the Faculty
of Computer Science and Informatics, Amman Arab University, Jordan. His current research
interests include mobility management, network management and OAM (Operation,
Administration and Maintenance) for future mobile network.
Chul-Soo Kim is a professor in the School of Computer Engineering of Inje University in
Gimhae, Korea. He received Ph.D. from the Pusan National University (Pusan, Korea) and
worked for ETRI (Electronics and Telecommunication research Institute) from 1985 - 2000
as senior researcher for developing TDX exchange. Aside from the involvement in various
national and international projects, his primary research interests include network protocols,
traffic management, OAM issue, and NGN charging. He is a member of ITU-T SG3, SG11,
SG13 and a Rapporteur of ATM Lite from 1998 - 2002, and CEO in WIZNET from 2000 - 2001. He is
currently the chairperson of BcN Reference Model in Korea, and a Rapporteur of ITU-T SG3 NGN
Charging.