• Title/Summary/Keyword: 5G network

Search Result 704, Processing Time 0.047 seconds

Trends of Standardization Activity for 5G RAN Architecture (5G RAN 아키텍처 표준동향)

  • Song, P.J.;Song, S.I.
    • Electronics and Telecommunications Trends
    • /
    • v.31 no.6
    • /
    • pp.88-96
    • /
    • 2016
  • 5G RAN은 4G가 진화된 무선기술(evolved E-UTRA)과 5G 무선기술(New Radio, NR)을 모두 지원하는 새로운 무선액세스 네트워크(New RAN)이며, 코어 네트워크 (EPC and NGC)과 접속되어 5G 시스템(NextGen System)을 구성한다. 본고에서는 5G RAN(Radio Access Network,)을 대상으로, RAN 시설 배치 시나리오, RAN과 CN 간 기능 분배 및 인터페이스, 프런트-홀 네트워크의 전송 용량 및 지연, New RAN과 E-UTRA 간 모빌리티 시나리오 등에 대한 표준 이슈를 살펴본다. 마지막 절에선 RAN의 네트워크 슬라이싱 지원 방안으로 상위레벨 개념의 구조와 절차를 정리한다. 본 문서는 3GPP RAN3 그룹의 기술보고서(TR 38.801)와 SA2 기술보고서(TR 23.799)를 바탕으로 작성되었다.

  • PDF

Trends of 5G Architecture Research (5G 아키텍처 연구동향)

  • Yoo, T.W.;Song, J.T.;Song, H.Y.
    • Electronics and Telecommunications Trends
    • /
    • v.31 no.1
    • /
    • pp.1-13
    • /
    • 2016
  • 5G는 2020년 이후를 위한 4G 다음 세대의 이동통신으로 검토가 시작되었으나, 이동통신의 연장선이 아닌 이동통신과 네트워크의 새로운 패러다임으로 인식되고 있다. 5G는 이동통신, 인터넷, 클라우드가 통합되는 네트워크 + IT 환경이 될 것이며, 기술, 서비스, 타 산업과의 관계, 시장, 사업구도 등 모든 면에서 새로운 변화가 예상된다. 본고에서는 2016년을 기점으로 본격화될 5G의 아키텍처에 대한 최근 연구동향을 정리한다. 아키텍처의 범위는 Radio Access Network(RAN) 아키텍처, 코어네트워크 아키텍처, 가상화/프로그래머블 아키텍처, 네트워크 관리 자동화/지능화 아키텍처 등이다. 주요 연구프로젝트, 통신사업자, 산업체 등에서 제안한 5G 아키텍처 현안들을 각각 정리한다.

  • PDF

Advanced Transverse Wave Approach for MM-Wave Analysis of Planar Antennas applied in 5G-Technology

  • Ayari, Mohamed;Touati, Yamen El;Altowaijri, Saleh
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.295-299
    • /
    • 2022
  • In this paper, a fast numerical electromagnetic (EM) method based on the transverse wave formulation called-up Advanced Transverse Wave Approach (A-TWA) is presented. An appropriate 5G antenna is designed, simulated and investigated in the context of Millimeter-Wave Wireless Communication Systems. The obtained simulation results are found in good agreement with literature. Such a method can provide for the simulators a great library integrating the most complexly and sensitively geometry elements that can have a huge impact on the applications supported by new wireless technologies.

Analysis & Implementation of SISO, SIMO, MISO and MIMO in 5G Communication Systems Based on SDR

  • Meriem DRISSI;Nabil BENJELLOUN;Philippe DESCAMPS;Ali GHARSALLAH
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.140-146
    • /
    • 2023
  • With the rapid growth of new users and massive need for very high data rate in 5G communications system, different technologies have been developed and applied to enhance communication efficiency. One of those technologies is the MISO, MISO and MIMO which transmits and receives information with more reliability by using multiple antennas on transmitter or/and receiver side. This paper presents the latest trends in 5G telecommunications system based on software defined radio, A novel low-cost SIMO, MISO and MIMO using flexibility between USRP and Simulink is implemented tested and validated.

A Review of Security Policy and 3-Steps for Defense 5G (국방 5G 운영을 위한 보안정책과 단계별 구축에 대한 고찰)

  • Song, Won-Seok;Cho, Jun-Ha;Kang, Seong-Moon;Lee, MinWoo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.597-599
    • /
    • 2021
  • 5G technology will be applied to various technologies related to game changers in the defense field. In addition, the establishment of a mobile work environment will be utilized. 5G has emerged as a new threat due to major technologies different from previous technologies. And due to 5G technology, there is an increasing demand to apply mobile technology to the defense sector. In this paper, we look at the security policy for defense 5G operation and the step-by-step construction plan consisting of three.

  • PDF

A Study on Security Requirements for 5G Base Station (5G 기지국에 대한 보안성평가기준 연구)

  • Hong, Paul;Kim, Yejun;Cho, Kwangsoo;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.919-939
    • /
    • 2021
  • As a next-generation communication technology, 5G networks are capable of handling large amounts of traffic based on higher speeds, shorter communication delays, and higher connectivity compared to 4G networks. In this 5G network environment, base stations are installed all over the city at high density due to their characteristics, and are connected to user terminals to provide services. Therefore, if the base station is damaged by a malicious attacker, it is expected to cause great damage to users and society as a whole. So the need for secure communication equipment such as 5G base stations has emerged. Therefore, in this paper, we propose the security functional requirements derived using threat modeling, a systematic methodology for 5G base stations, and the security assurance requirements at the level that can cope with the backdoor issues. The security requirements proposed in this paper can be used for base station design and development to construct a secure network environment as a security evaluation standard for 5G base stations.

Analysis of Beam Discovery and Link setup for MXN based mmWave (mmWave기반의 MXN 빔 탐색 및 링크설정 방식 분석)

  • Baek, Seungkwon;Han, Kijun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.2
    • /
    • pp.381-388
    • /
    • 2019
  • In this paper, we propose a new wireless transport network, which is named as Mobile Xhaul Network(MXN), that is enable to bring cost efficiency of fronthaul, midhaul and backhaul and to make easy installation of 5G Radio Access Network(RAN). For this purpose, we design XDU discovery and xhaul link setup mechanism with MXN architecture and operational procedure. Especially, in this paper, we propose various types of beam discovery mechanisms for mmWave based radio access on XDU and evaluate proposed schemes. The Simulation result shows that threshold based scheme and information based scheme have less than about 50% beam discovery latency compared to full search scheme.

Deep Neural Network-Based Critical Packet Inspection for Improving Traffic Steering in Software-Defined IoT

  • Tam, Prohim;Math, Sa;Kim, Seokhoon
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.1-8
    • /
    • 2021
  • With the rapid growth of intelligent devices and communication technologies, 5G network environment has become more heterogeneous and complex in terms of service management and orchestration. 5G architecture requires supportive technologies to handle the existing challenges for improving the Quality of Service (QoS) and the Quality of Experience (QoE) performances. Among many challenges, traffic steering is one of the key elements which requires critically developing an optimal solution for smart guidance, control, and reliable system. Mobile edge computing (MEC), software-defined networking (SDN), network functions virtualization (NFV), and deep learning (DL) play essential roles to complementary develop a flexible computation and extensible flow rules management in this potential aspect. In this proposed system, an accurate flow recommendation, a centralized control, and a reliable distributed connectivity based on the inspection of packet condition are provided. With the system deployment, the packet is classified separately and recommended to request from the optimal destination with matched preferences and conditions. To evaluate the proposed scheme outperformance, a network simulator software was used to conduct and capture the end-to-end QoS performance metrics. SDN flow rules installation was experimented to illustrate the post control function corresponding to DL-based output. The intelligent steering for network communication traffic is cooperatively configured in SDN controller and NFV-orchestrator to lead a variety of beneficial factors for improving massive real-time Internet of Things (IoT) performance.

GROUP SECRET KEY GENERATION FOR 5G Networks

  • Allam, Ali M.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.8
    • /
    • pp.4041-4059
    • /
    • 2019
  • Key establishment method based on channel reciprocity for time division duplex (TDD) system has earned a vital consideration in the majority of recent research. While most of the cellular systems rely on frequency division duplex (FDD) systems, especially the 5G network, which is not characterized by the channel reciprocity feature. This paper realizes the generation of a group secret key for multi-terminals communicated through a wireless network in FDD mode, by utilizing the nature of the physical layer for the wireless links between them. I consider a new group key generation approach, which using bitwise XOR with a modified pairwise secret key generation approach not based on the channel reciprocity feature. Precisely, this multi-node secret key agreement technique designed for three wireless network topologies: 1) the triangle topology, 2) the multi-terminal star topology, and 3) the multi-node chain topology. Three multi-node secret key agreement protocols suggest for these wireless communication topologies in FDD mode, respectively. I determine the upper bound for the generation rate of the secret key shared among multi-node, for the three multi-terminals topologies, and give numerical cases to expose the achievement of my offered technique.

5G Mobile Traffic Forecast (5G 모바일 트래픽 전망)

  • Jahng, J.H.;Park, S.K.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.6
    • /
    • pp.129-136
    • /
    • 2020
  • Korea launched the world's first commercial 5G services in April 2019. Mobile traffic is expected to increase further with the acceleration of mobile-centric data utilization. It is one of the most important indexes of the growth of the mobile communications market, and it has a close relationship with frequency demand and supply, network management, and information communication policy. To overcome the limitations of an analytical solution due to the high complexity of the real world, this paper estimates the diffusion of 5G users using systemic thinking and the behavior of individual agents. Based on these demand forecasts, contributions to the establishment of strategic policies are suggested. For better understanding, global 5G predictions of subscribers and mobile traffic are also compared.