Page 96 - 5G Basics - Core Network Aspects
P. 96

1                                                Core network aspects




                                                 LINP manager for LINP 1
                                                                             LINP 1      On-demand,
                                                                                         scheduled





                                                                                            Users
                                                 LINP manager for LINP 2
                                                                             LINP 2

                  Resource partitioning per user's demand  LINP manager for LINP 3  LINP 3             Virtual resources manager






























                                                                                                Y.3011(12)_F02


                                Figure 2 – Concept of LINP provided by network virtualization


            Network virtualization can improve the utilization of physical resources by allowing multiple virtual resources
            to coexist  in  a  physical  resource.  Also,  the  abstraction  and  programmability  property  provides  standard
            interfaces for managing and modifying the LINPs and help to support seamless modification and migration
            of the network in order to provide services whose functions are designed to be appropriate to the needs of
            applications and users.


            7       Problem spaces

            This clause investigates the problems of current networks and how network virtualization can be used to
            mitigate the problems.


            7.1     Coexistence of multiple networks
            Conventional technologies, such as virtual private network (VPN) and virtual local area network (VLAN), are
            typically used for providing isolated networks over shared physical networks. However, it is known that these
            technologies have disadvantages and limitations.

            For example, VPN relies on tunnelling mechanisms and internet protocol security (IPsec) in order to provide
            secure  multiple  networks  over  public  networks.  However,  the  current  VPN  technologies  suffer  from
            disadvantages in scalability, performance and throughput, which are caused by the complex encapsulation
            and authentication mechanisms. So, it appears that adding VPN mechanisms to existing protocols brings

            86
   91   92   93   94   95   96   97   98   99   100   101