A future-proof network architecture

M. Johnsson, B. Ohlman, A. Surtees, R. Hancock, P. Schoo, K. Ahmed, F. Pittmann, R. Rembarz, M. Brunner

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Citations (Scopus)

Abstract

Extensibility is one of the key architectural considerations in developing a modern communications system. Today's networks allow for extensions only within the context of strong assumptions about underlying invariants such as business models, protocol boundaries and application scenarios. The Ambient Networks project is developing an architecture which is proof against a much more uncertain future for fixed and mobile networks, where all such assumptions may break down in time. The goal is that an existing Ambient Network can adapt to a new scenario or incorporate a new type of function with minimal cost and disruption, and maximal re-use of deployed infrastructure. This paper describes the architecture with a focus on its two key extensibility mechanisms: a modular control space which allows the plug and play rearrangement of management and control functions, and a configurable user plane which provides enhanced data transport over a wide variety of connectivity infrastructures. Both mechanisms emphasise the definition of open interfaces and programmability via policy systems.

Original languageEnglish
Title of host publication2007 16th IST Mobile and Wireless Communications Summit
DOIs
Publication statusPublished - 2007
Externally publishedYes
Event2007 16th IST Mobile and Wireless Communications Summit - Budapest, Hungary
Duration: 01 Jul 200705 Jul 2007

Publication series

Name2007 16th IST Mobile and Wireless Communications Summit

Conference

Conference2007 16th IST Mobile and Wireless Communications Summit
Country/TerritoryHungary
CityBudapest
Period01/07/200705/07/2007

Keywords

  • Ambient
  • Extensibility
  • Migration
  • Network architecture
  • Networks
  • Plug & play

Fingerprint

Dive into the research topics of 'A future-proof network architecture'. Together they form a unique fingerprint.

Cite this