A current trend in networking and cloud computing is to provide compute resources at widely distributed sites;this is exemplified by developments such as networkfunction virtualization. This paves the way for wide-ar...
详细信息
A current trend in networking and cloud computing is to provide compute resources at widely distributed sites;this is exemplified by developments such as networkfunction virtualization. This paves the way for wide-area service deployments with improved service quality: e.g., user-perceived response times can be reduced by offering services at nearby sites. But always assigning users to the nearest site can be a bad decision if this site is already highly utilized. This paper formalizes two related decisions of allocating compute resources at different sites and assigning users to them with the goal of minimizing the response times while the total number of resources to be allocated is limited-a non-linear capacitated facility location problem with integrated queuing systems. To efficiently handle its non-linearity, we introduce five linear problem linearizations and adapt the currently best heuristic for a similar scenario to our scenario. All six approaches are compared in experiments for solution quality and solving time. Surprisingly, our best optimization formulation outperforms the heuristic in both time and quality. Additionally, we evaluate the influence of distributions of available compute resources in the network on the response time: the time was halved for some configurations. The presented formulation techniques for our problem linearizations are applicable to a broader optimization domain.
Next generation use-cases of wireless networks require a great deal of flexibility in order to adopt to the constantly changing state of innovation and to accommodate future application requirements. Header compressio...
详细信息
ISBN:
(纸本)9783800749485
Next generation use-cases of wireless networks require a great deal of flexibility in order to adopt to the constantly changing state of innovation and to accommodate future application requirements. Header compression has been an ever present solution since the advent of wireless networks and the most current version of it, Robust Header Compression (RoHC), has seen a widespread adoption in Long Term Evolution (LTE) cellular networks. Recent research has mostly focused on the integration and enhancement of RoHC, instead of advancing the core concept of the compression. In this paper we present for the first time a novel design that can tackle the compression of arbitrary packet streams regardless of the employed protocols and the transmitted data. We present our initial findings for an error-free scenario with various simulated and real-life packet streams and show that even with the absence of design time knowledge about the packet structures, one can compress a significant part of the streams, yielding compression gains for IP packets up to 90%, as an example.
Wireless networks in buildings suffer from congestion, interference, security and safety concerns, restricted propagation and poor in-door location accuracy. The Internet of Radio-Light (IoRL) project develops a safer...
详细信息
ISBN:
(纸本)9781538610985
Wireless networks in buildings suffer from congestion, interference, security and safety concerns, restricted propagation and poor in-door location accuracy. The Internet of Radio-Light (IoRL) project develops a safer, more secure, customizable and intelligent building network that reliably delivers increased throughput (greater than 10Gbps) from access points pervasively located within buildings, whilst minimizing interference and harmful EM exposure and providing location accuracy of less than 10 cm. It thereby shows how to solve the problem of broadband wireless access in buildings and promotes the establishment of a global standard in ITU.
This paper presents a study of Service function Chaining (SFC) isolation and encryption in interconnected network function virtualisation (NFV) domains. The adoption of NFV deployments is currently designed to be impl...
详细信息
ISBN:
(纸本)9781509039449
This paper presents a study of Service function Chaining (SFC) isolation and encryption in interconnected network function virtualisation (NFV) domains. The adoption of NFV deployments is currently designed to be implemented within trusted domains where overlay networks with statically trusted links are considered to enable network security. We challenge this statement and introduce a security problem related to Virtual networkfunctions (VNF) confidentiality and isolation. A dataflow that traverses through a chain of Virtual networkfunctions (VNF) cannot be end-toend encrypted when each VNF must have access to the dataflow. This restricts both end-users and Service Providers from enabling end-to-end security and VNF isolation to their NFV flow. Therefore, there is a need to encrypt the dataflows on a per flow basis. In this paper we present the discovered security problem, set the requirements for the problem solution and study the constraints for securing and isolating VNFs in a Service function Chain.
This paper highlights the vision of CASPER project towards user-centric network and service management in future mobile networks. Putting the end-users of the network at the epicenter of the service provisioning proce...
详细信息
ISBN:
(纸本)9781509063024
This paper highlights the vision of CASPER project towards user-centric network and service management in future mobile networks. Putting the end-users of the network at the epicenter of the service provisioning process, CASPER builds on top of the Software Defined networking (SDN) and the networkfunctions Virtualization (NFV) advances a middleware architecture which will realize user-centric orchestration of service and networkfunctions. User centricity will be leveraged through a Quality of Experience-oriented framework, composed of three modular functions, namely the QoE monitoring and estimation, the QoE service and network management, and the QoE control interface.
In this demo we introduce X-MANO, a crossdomain network service orchestration framework consisting in an inter-domain confidentially-presenting federation interface and in an information model for multi-domain network...
详细信息
ISBN:
(纸本)9781509060085
In this demo we introduce X-MANO, a crossdomain network service orchestration framework consisting in an inter-domain confidentially-presenting federation interface and in an information model for multi-domain network service life-cycle programmability. X-MANO is effectively deploymentagnostic and can be used in hierarchical, peer-to-peer and cascading (or recursive) configuration. During this demo we will illustrate how to deploy a video transcoding application. The network service is composed by one streaming VNF and one transcoding VNF deployed over two different domains. Finally, we release all the code under a permissive APACHE 2.0 license making it available to researchers and practitioners.
In the recent years several proprietary as well as open-source frameworks for network service orchestration have emerged. Similarly a significant body of literature has been produced investigating both the theoretical...
详细信息
ISBN:
(纸本)9781509060085
In the recent years several proprietary as well as open-source frameworks for network service orchestration have emerged. Similarly a significant body of literature has been produced investigating both the theoretical and practical aspects of network service orchestration. Nevertheless, currently available frameworks for network service orchestration are designed under the assumption that they can have full control over the resources being orchestrated. Such assumption does not hold any more when there is the need to pool both physical and virtual resources across different technological and administrative domains in order to deploy a service. In such a scenario, the different infrastructure providers may be reluctant to provide full access to their resources to a third party. In this paper we present X-MANO, a cross-domain network service orchestration framework. X-MANO is effectively deployment-agnostic and can be used in hierarchical, peer-to-peer and cascading (or recursive) configuration. We validate X-MANO through a proof-of-concept implementation over a multi-domain testbed. Finally, we release all the code under a permissive APACHE 2.0 license making it available to researchers and practitioners.
In the context of next generation 5G networks, the satellite industry is clearly committed to revisit and revamp the role of satellite communications. As major drivers in the evolution of (terrestrial) fixed and mobil...
详细信息
In the context of next generation 5G networks, the satellite industry is clearly committed to revisit and revamp the role of satellite communications. As major drivers in the evolution of (terrestrial) fixed and mobile networks, Software Defined networking (SDN) and network function virtualisation (NFV) technologies are also being positioned as central technology enablers towards improved and more flexible integration of satellite and terrestrial segments, providing satellite network further service innovation and business agility by advanced network resources management techniques. Through the analysis of scenarios and use cases, this paper provides a description of the benefits that SDN/NFV technologies can bring into satellite communications towards 5G. Three scenarios are presented and analysed to delineate different potential improvement areas pursued through the introduction of SDN/NFV technologies in the satellite ground segment domain. Within each scenario, a number of use cases are developed to gain further insight into specific capabilities and to identify the technical challenges stemming from them. (C) 2015 Elsevier B.V. All rights reserved.
This paper presents a study of Service function Chaining(SFC) isolation and encryption in interconnected network function virtualisation(NFV) domains. The adoption of NFV deployments is currently designed to be implem...
详细信息
This paper presents a study of Service function Chaining(SFC) isolation and encryption in interconnected network function virtualisation(NFV) domains. The adoption of NFV deployments is currently designed to be implemented within trusted domains where overlay networks with statically trusted links are considered to enable network security. We challenge this statement and introduce a security problem related to Virtual networkfunctions(VNF) confidentiality and isolation. A dataflow that traverses through a chain of Virtual networkfunctions(VNF) cannot be end-toend encrypted when each VNF must have access to the dataflow. This restricts both end-users and Service Providers from enabling end-to-end security and VNF isolation to their NFV flow. Therefore, there is a need to encrypt the dataflows on a per flow basis. In this paper we present the discovered security problem, set the requirements for the problem solution and study the constraints for securing and isolating VNFs in a Service function Chain.
This paper centres on the study of concepts and applications of software defined networking (SDN) which is a network architecture that decouples the network control logic from the underlying network infrastructure ele...
详细信息
ISBN:
(纸本)9781467387224
This paper centres on the study of concepts and applications of software defined networking (SDN) which is a network architecture that decouples the network control logic from the underlying network infrastructure elements. Separation of the control plane from the data plane is the basic principle of SDN. This gives a separation of functions which leads to better scalability, programmability, interoperation, performance and ease of management. SDN helps to keep up with the increasing demand for connectivity and bandwidth. This paper presents a review on how SDN can help drive development of network function virtualisation. Application of SDN to wireless and cellular data networks is also studied. Finally, vulnerabilities associated with SDN are discussed and recommendations are offered on how to make SDN more secure and reliable. A detailed architecture for a networkfunction virtualised mobile cellular system is proposed as well as recommendations to improve security of these systems.
暂无评论