ArticlePDF Available

SDMN Architecture in 5G

Authors:
  • John von Neumann University, Hungary
  • John von Neumann University Kecskemet
  • John von Neumann University, Kecskemét, Hungary

Abstract and Figures

Due to the exponentially growing number of mobile devices connected to the Internet, the current 4G LTE-A mobile network will no longer be able to serve the nearly 5 billion mobile devices. With the advent of the fifth generation, however, the number of cybercrimes may increase. This requires building an architecture that can adequately protect against these attacks. For wired networks, the SDN-type architecture has been introduced for some time. As a result, a similar design concept has emerged, which is called Software Defined Mobile Networks (SDMN). This article describes this technology and how it helps prevents DoS, DDoS at-tacks, and IP source spoofing.
Content may be subject to copyright.

7

SDMN ARCHITECTURE IN 5G
,,
John von Neumann University, GAMF Faculty of Engineering and Computer Science, Kecskemét, Hungary
1 kovacs.mark@gamf.uni-neumann.hu
2 agg.peter@gamf.uni-neumann.hu
3 johanyak.csaba@gamf.uni-neumann.hu
Abstract



  



Keywords: SDN, 5G, NFV, SDMN, security.
1. Software Dened Networks (SDN)


  [1]     
      
  

       




       
        



[2]



        
         
    
[3]
 
 


        

     

        
      
   
      



2. SDN and NFV
     
       
      
        


     

Kovács M., Agg P. A., Johanyák Zs. Cs. – Műszaki Tudományos Közlemények 13. (2020)




     
     

 

  

  

3. Shortcomings of current cellular
networks



       




 

Lack of appropriate scalability  
       
  


Complex Network Management  
       
       

Manual Network Conguration:   

  

Complex and expensive network devices 




High costs:     
    


Rigidity
 

4. Software dened mobile networks
(SDMN)
      

        

      
     
  
       
   





      


      
 
     


  
     

Figure2.
[7]
4.1. DP layer


 
      
Figure 1. Global mobile data trac between 2017 and
2022. [4]
Kovács M., Agg P. A., Johanyák Zs. Cs. – Műszaki Tudományos Közlemények 13. (2020) 
       

4.2. Network controller
      
        


     
  


4.3. Application layer

    



5. Security aws


    
    
   

  
[8]
      

       
    


 





     
     
     
     
 
[10]
   
       

Conclusion

      



Acknowledgement
     
      

  


Figure 2. SDMN architecture. [6]
Figure 3. Connection between Backhaul and Front-
haul networks. [9]
Kovács M., Agg P. A., Johanyák Zs. Cs. – Műszaki Tudományos Közlemények 13. (2020)

References
         Soft-
ware-dened networks: On the road to the soft-
warization of networking.   
    
    
    

       Network
innovation using OpenFlow: A survey
     


  Network function virtualization: Chal-
lenges and opportunities for innovations. 
    

  Global mobile data trac from 2017 to
2022


        
 Device-to-Device Communications for 5G
Internet of Things






       Software
Dened Mobile networks (SDMN) Beyond LTE net-
work architecture
  Overview of 5G se-
curity technology.     

Performance
Evaluation of Ethernet Network for Mobile Fron-
thual Networks
     Enhancing Security of Soft-
ware Dened Mobile Networks.   

... By employing SDN applications and proper monitoring, rapid responses to network changes can be achieved, such as addressing load balancing issues, lost routes leading to topological changes, or unexpected attacks. Centralization eliminates the need for local reconfiguration, allowing for quick and efficient changes through the controller [22]. This capability is beneficial for network operation from all perspectives, and our article focuses on potential solutions for improving energy usage. ...
Article
Full-text available
Energy consumption is a significant concern in daily life, often neglected in terms of cost and environmental impact. Since IT networks play an essential role in our daily routines, energy-saving in this area is crucial. However, the implementation of energy efficiency solutions in this field have to ensure that the network performance is minimally affected. Traditional networks encounter difficulties in achieving this goal. Software-Defined Networks (SDN), which have gained popularity in the past decade, offer easy-to-use opportunities to increase energy efficiency. Features like central controllability and quick programmability can help to reduce energy consumption. In this article, a new algorithm named the Modified Heuristic Algorithm for Energy Saving (MHAES) is presented, which was compared to eight commonly used methods in different topologies for energy efficiency. The results indicate that by maintaining an appropriate load balance, one can save more energy than in case of using some other well-known procedures by applying a threshold value based on forecast, keeping only a minimal number of nodes in an active state, and ensuring that nodes not participating in packet transmission remain in sleep mode.
Article
Full-text available
p>Increasing mobile data traffic due to the rise of both smartphones and tablets has led to high-capacity demand of mobile data network. To meet the ever-growing capacity demand and reduce the cost of mobile network components, Cloud Radio Access Network (C-RAN) has emerged as a promising solution. In such network, the mobile operator’s Remote Radio Head (RRH) and Base Band Unit (BBU) are often separated and the connection between them has very tight timing and latency requirements imposed by Common Public Radio Interface (CPRI) and 3rd Generation Partnership Project (3GPP). This fronthaul connection is not yet provided by packet based network. To employ packet-based network for C-RAN fronthaul, the carried fronthaul traffic are needed to achieve the requirements of fronthaul streams. For this reason, the aim of this paper is focused on investigating and evaluating the feasibility of Ethernet networks for mobile fronthaul. The fronthaul requirements used to evaluate and investigate this network are maximum End to End (E2E) latency, Packet Loss Ratio (PLR) and Packet Delay Variation (PDV). The simulated results and numerical analysis confirm that the PDV and PLR of High Priority (HP) traffic in Ethernet network meet the requirements of mobile fronthaul using CPRI. However, the PDV of HP traffic meets the fronthaul network when the number of nodes in the Ethernet network is at most four. For Ethernet network, the number of nodes in the network limits the maximum separation distance between BBU and RRH (link length); for increasing the number of nodes, the link length decreases. Consequently, Radio over Ethernet (RoE) traffic should receive the priority and Quality of Service (QoS) HP can provide. On the other hand, Low Priority (LP) classes are not sensitive to QoS metrics and should be used for transporting time insensitive applications and services.</p
Article
Full-text available
Increasing mobile data traffic due to the rise of both smartphones and tablets has led to high-capacity demand of mobile data network. To meet the ever-growing capacity demand and reduce the cost of mobile network components, Cloud Radio Access Network (C-RAN) has emerged as a promising solution. In such network, the mobile operator’s Remote Radio Head (RRH) and Base Band Unit (BBU) are often separated and the connection between them has very tight timing and latency requirements imposed by Common Public Radio Interface (CPRI) and 3rd Generation Partnership Project (3GPP). This fronthaul connection is not yet provided by packet based network. To employ packet-based network for C-RAN fronthaul, the carried fronthaul traffic are needed to achieve the requirements of fronthaul streams. For this reason, the aim of this paper is focused on investigating and evaluating the feasibility of Ethernet networks for mobile fronthaul. The fronthaul requirements used to evaluate and investigate this network are maximum End to End (E2E) latency, Packet Loss Ratio (PLR) and Packet Delay Variation (PDV). The simulated results and numerical analysis confirm that the PDV and PLR of High Priority (HP) traffic in Ethernet network meet the requirements of mobile fronthaul using CPRI. However, the PDV of HP traffic meets the fronthaul network when the number of nodes in the Ethernet network is at most four. For Ethernet network, the number of nodes in the network limits the maximum separation distance between BBU and RRH (link length); for increasing the number of nodes, the link length decreases. Consequently, Radio over Ethernet (RoE) traffic should receive the priority and Quality of Service (QoS) HP can provide. On the other hand, Low Priority (LP) classes are not sensitive to QoS metrics and should be used for transporting time insensitive applications and services. © 2017 Institute of Advanced Engineering and Science. All rights reserved.
Book
Full-text available
This book describes the concept of a Software Defined Mobile Network (SDMN), which will impact the network architecture of current LTE (3GPP) networks. SDN will also open up new opportunities for traffic, resource and mobility management, as well as impose new challenges on network security. Therefore, the book addresses the main affected areas such as traffic, resource and mobility management, virtualized traffics transportation, network management, network security and techno economic concepts. Moreover, a complete introduction to SDN and SDMN concepts. Furthermore, the reader will be introduced to cutting-edge knowledge in areas such as network virtualization, as well as SDN concepts relevant to next generation mobile networks. Finally, by the end of the book the reader will be familiar with the feasibility and opportunities of SDMN concepts, and will be able to evaluate the limits of performance and scalability of these new technologies while applying them to mobile broadb and networks.
Article
Full-text available
Traffic volumes in mobile networks are rising and end-user needs are rapidly changing. Mobile network operators need more flexibility, lower network operating costs, faster service roll-out cycles and new revenue sources. 5G and future networks aim to deliver ultra-fast and ultra-reliable network access capable of supporting the anticipated surge in data traffic and connected nodes in years to come. Several technologies have been developed to meet these emergent demands of future mobile networks, among these are Software Defined Networking (SDN), Network Function Virtualization (NFV) and cloud computing. In this paper, we discuss the security challenges these new technologies are prone to in the context of the new telecommunication paradigm. We present a multi-tier component based architecture to address these challenges and secure Software Defined Mobile Network (SDMN), by handling security at different levels to protect the network and its users. The proposed architecture contains methods for elevated security in the control and the data planes of SDMNs. Finally, the proposed security mechanisms are validated in testbed environments.
Article
Full-text available
The future 5G wireless is triggered by the higher demand on wireless capacity. With Software Defined Network (SDN), the data layer can be separated from the control layer. The development of relevant studies about Network Function Virtualization (NFV) and cloud computing has the potential of offering a quicker and more reliable network access for growing data traffic. Under such circumstances, Software Defined Mobile Network (SDMN) is presented as a promising solution for meeting the wireless data demands. This paper provides a survey of SDMN and its related security problems. As SDMN integrates cloud computing, SDN, and NFV, and works on improving network functions, performance, flexibility, energy efficiency, and scalability, it is an important component of the next generation telecommunication networks. However, the SDMN concept also raises new security concerns. We explore relevant security threats and their corresponding countermeasures with respect to the data layer, control layer, application layer, and communication protocols. We also adopt the STRIDE method to classify various security threats to better reveal them in the context of SDMN. This survey is concluded with a list of open security challenges in SDMN.
Article
Full-text available
Traditional IP networks are complex and hard to manage. The vertical integration of the infrastructure, with the control and data planes tightly coupled in network equipment, makes it a challenging task to build and maintain efficient networks in an era of cloud computing. Software-Defined Networking (SDN) breaks this coupling by segregating network control from routers and switches and by logically centralizing it in an external entity that resides in commodity servers. This way, SDN provides the flexibility required to dynamically program the network, promoting the “softwarization” of networking. In this article we introduce this new paradigm and show how it breaks the status quo in networking. We present the most relevant building blocks of the infrastructure and discuss how SDN is leading to a horizontal industry based on programmable and open components. We pay particular attention to use cases that demonstrate how IT companies such as Google, Microsoft, and VMware are embracing SDN to operate efficient networks and offer innovative networking services.
Article
Full-text available
The proliferation of heterogeneous devices connected through large-scale networks is a clear sign that the vision of the Internet of Things (IoT) is getting closer to becoming a reality. Many researchers and experts in the field share the opinion that the next-to-come fifth generation (5G) cellular systems will be a strong boost for the IoT deployment. Device-to-Device (D2D) appears as a key communication paradigm to support heterogeneous objects interconnection and to guarantee important benefits. In this paper, we thoroughly discuss the added-value features introduced by cellular/non-cellular D2D communications and its potential in efficiently fulfilling IoT requirements in 5G networks. State-of-the-art solutions, enabling radio technologies, and current standardization activities for D2D communications are surveyed and their pros and cons with reference to manifold IoT use cases pointed out. Future research directions are then presented towards a fully converged 5G IoT ecosystem.
Article
The 5th-generation mobile communication system (5G) has higher security requirements than previous systems. Accordingly, international standard organizations, operators, and equipment manufacturers are focusing extensively on 5G security technology. This paper analyzes the security requirements of 5G business applications, network architecture, the air interface, and user privacy. The development trends of 5G security architecture are summarized, with a focus on endogenous defense architecture, which represents a new trend in 5G security development. Several incremental 5G security technologies are reviewed, including physical layer security, lightweight encryption, network slice security, user privacy protection, and block chain technology applied to 5G. © 2018, Science China Press and Springer-Verlag GmbH Germany, part of Springer Nature.
Article
Network function virtualization was recently proposed to improve the flexibility of network service provisioning and reduce the time to market of new services. By leveraging virtualization technologies and commercial off-the-shelf programmable hardware, such as general-purpose servers, storage, and switches, NFV decouples the software implementation of network functions from the underlying hardware. As an emerging technology, NFV brings several challenges to network operators, such as the guarantee of network performance for virtual appliances, their dynamic instantiation and migration, and their efficient placement. In this article, we provide a brief overview of NFV, explain its requirements and architectural framework, present several use cases, and discuss the challenges and future directions in this burgeoning research area.
Article
OpenFlow is currently the most commonly deployed Software Defined Networking (SDN) technology. SDN consists of decoupling the control and data planes of a network. A software-based controller is responsible for managing the forwarding information of one or more switches; the hardware only handles the forwarding of traffic according to the rules set by the controller. OpenFlow is an SDN technology proposed to standardize the way that a controller communicates with network devices in an SDN architecture. It was proposed to enable researchers to test new ideas in a production environment. OpenFlow provides a specification to migrate the control logic from a switch into the controller. It also defines a protocol for the communication between the controller and the switches. As discussed in this survey paper, OpenFlow-based architectures have specific capabilities that can be exploited by researchers to experiment with new ideas and test novel applications. These capabilities include software-based traffic analysis, centralized control, dynamic updating of forwarding rules and flow abstraction. OpenFlow-based applications have been proposed to ease the configuration of a network, to simplify network management and to add security features, to virtualize networks and data centers and to deploy mobile systems. These applications run on top of networking operating systems such as Nox, Beacon, Maestro, Floodlight, Trema or Node.Flow. Larger scale OpenFlow infrastructures have been deployed to allow the research community to run experiments and test their applications in more realistic scenarios. Also, studies have measured the performance of OpenFlow networks through modelling and experimentation.We describe the challenges facing the large scale deployment of OpenFlow-based networks and we discuss future research directions of this technology.