Traditional Culture Encyclopedia - Traditional virtues - What are the key technologies that enable network slicing deployment and operations?
What are the key technologies that enable network slicing deployment and operations?
The implementation of network slicing deployment and operations relies on virtualization technologies and software-defined networking (SDN).
Now network slicing, need to rely on two key technologies, one is the virtualization technology, the physical network abstraction into logical resources, and then based on the logical system to facilitate the formation of logical networks, which can make the public **** resources quickly transformed into a dedicated resource, for example, your enterprise can be based on the physical network of the 5G to build a dedicated logical network named after your company! .
The second key technology that enables slicing is software-defined networking (SDN), which allows you to control the operation of your network with software. For example, when you exceed how much traffic you have this month, the network speed will automatically slow down, which is an application of software-defined networking. This is equivalent to the use of software algorithms, intelligent operation and maintenance control of the network.
Network slicing technology:
Network slicing is the process of cutting a physical network into multiple virtual end-to-end networks, each of which is logically independent of each other (including the devices within the network, access, transport and core network), and the failure of any of the virtual networks will not affect the other virtual networks.
Based on application scenarios, 5G networks can be categorized into 3 types: mobile broadband, massive IoT and mission-critical IoT. Since the 3 types of application scenarios of 5G networks have different service requirements, and different devices in different fields have access to the network in large quantities, network slicing can divide a physical network into multiple virtual logical networks, and each virtual network corresponds to different application scenarios, so as to satisfy different needs.
- Previous article:The following cases belong to the information network crime of property infringement ().
- Next article:The westernmost county in China
- Related articles
- How to make lead-free preserved eggs by yourself?
- Leading enterprises of solid-state batteries (latest list)
- Where can I buy such books mainly about medicine?
- Suichuan rural traditional suona
- What to do if you can't access the internet on your old TV
- Characteristics and uses of printing paper
- Parents' custom of celebrating the New Year ¡ª¡ª About 300 words in Henan composition
- Gansu has barren land and vast mountains. Why not develop animal husbandry and focus on planting?
- What is the purpose of design?
- Does anyone know who is the national first-class painter in Hebei Province?