2015
DOI: 10.1109/comst.2014.2352118
|View full text |Cite
|
Sign up to set email alerts
|

Wireless Network Virtualization: A Survey, Some Research Issues and Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
400
0
2

Year Published

2016
2016
2020
2020

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 645 publications
(402 citation statements)
references
References 110 publications
0
400
0
2
Order By: Relevance
“…VRRM is in charge of managing the total available capacity provided by CRRM, through aggregating all the Radio Resource Units (RRUs) from different RATs, which can be OFDM (related to Wi-Fi), OFDMA (related to LTE), CDMA (related to UMTS), and TDMA (related to GSM), and sharing the capacity from separated slices associated with different services of VNOs. By providing isolation and element abstraction, VRRM enables each VNO to deploy its own protocol stack over the same set of RRUs per RAT (e.g., resource-blocks in LTE, codes in UMTS, time-slots in GSM, and carriers in Wi-Fi) [22], therefore, promoting the notion of multitenancy in a virtualised environment with several existing access techniques.…”
Section: Network Architecture and Main Assumptionsmentioning
confidence: 99%
“…VRRM is in charge of managing the total available capacity provided by CRRM, through aggregating all the Radio Resource Units (RRUs) from different RATs, which can be OFDM (related to Wi-Fi), OFDMA (related to LTE), CDMA (related to UMTS), and TDMA (related to GSM), and sharing the capacity from separated slices associated with different services of VNOs. By providing isolation and element abstraction, VRRM enables each VNO to deploy its own protocol stack over the same set of RRUs per RAT (e.g., resource-blocks in LTE, codes in UMTS, time-slots in GSM, and carriers in Wi-Fi) [22], therefore, promoting the notion of multitenancy in a virtualised environment with several existing access techniques.…”
Section: Network Architecture and Main Assumptionsmentioning
confidence: 99%
“…Handoff may be the procedure for altering the channel (frequency, time-slot, distributing signal, or mixture of them) linked to the current link while a call is progress [20], [22]. It's frequently started possibly by bridging a cell boundary or by collapse in quality of the signal in the present channel.…”
Section: Description Of Handoffmentioning
confidence: 99%
“…However, wireless technology is extremely vulnerable to new threats and exposes the existing profile to additional information security risks [3,4]. For instance, unencrypted or weakly encrypted algorithms allow attackers to read private information, thereby compromising data confidentiality.…”
Section: Introductionmentioning
confidence: 99%