A survey on 5G usage scenarios and traffic models

J Navarro-Ortiz, P Romero-Diaz… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
The fifth-generation mobile initiative, 5G, is a tremendous and collective effort to specify,
standardize, design, manufacture, and deploy the next cellular network generation. 5G …

A review on machine learning–based approaches for Internet traffic classification

O Salman, IH Elhajj, A Kayssi, A Chehab - Annals of Telecommunications, 2020 - Springer
Traffic classification acquired the interest of the Internet community early on. Different
approaches have been proposed to classify Internet traffic to manage both security and …

So-ran: Dynamic ran slicing via joint functional splitting and mec placement

B Ojaghi, F Adelantado… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Next-Generation (NG) mobile networks are expected to revolutionize wireless
communication systems, facilitating the deployment of critical applications with stringent …

SlicedRAN: Service-aware network slicing framework for 5G radio access networks

B Ojaghi, F Adelantado, A Antonopoulos… - IEEE Systems …, 2021 - ieeexplore.ieee.org
5G mobile networks are envisioned to substantiate new vertical services with diverse
performance requirements. Slicing in the radio access network (RAN) promises an efficient …

Modeling and dimensioning of a virtualized MME for 5G mobile networks

J Prados-Garzon, JJ Ramos-Munoz… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
Network function virtualization is considered one of the key technologies for developing
future mobile networks. In this paper, we propose a theoretical framework to evaluate the …

Mobile apps identification based on network flows

G Ajaeiya, IH Elhajj, A Chehab, A Kayssi… - … and Information Systems, 2018 - Springer
Network operators and mobile carriers are facing serious security challenges caused by an
increasing number of services provided by smartphone Apps. For example, Android OS has …

MECPASS: Distributed denial of service defense architecture for mobile networks

PC Lin, RH Hwang - IEEE Network, 2018 - ieeexplore.ieee.org
Distributed denial of service is one of the most critical threats to the availability of Internet
services. A botnet with only 0.01 percent of the 50 billion connected devices in the Internet of …

Latency evaluation of a virtualized MME

J Prados-Garzon, JJ Ramos-Munoz… - 2016 Wireless Days …, 2016 - ieeexplore.ieee.org
Network Virtualization is one of the key technologies for developing the future mobile
networks. In this paper we propose an LTE virtualized Mobility Management Entity queue …

Benefits of mobile end user network switching and multihoming

B Finley, A Basaure - Computer Communications, 2018 - Elsevier
Mobile users have not been able to exploit spatio-temporal differences between individual
mobile networks operators for a variety of reasons. End user network switching and …

Characterizing and Modeling Session-Level Mobile Traffic Demands from Large-Scale Measurements

AF Zanella, A Bazco-Nogueras, C Ziemlicki… - Proceedings of the 2023 …, 2023 - dl.acm.org
We analyze 4G and 5G transport-layer sessions generated by a wide range of mobile
services at over 282,000 base stations (BSs) of an operational mobile network, and carry out …