Filters








58 Hits in 6.0 sec

REF: Enabling Rapid Experimentation of Contextual Network Traffic Management Using Software Defined Networking

Lyndon Fawcett, Mu Mu, Bruno Hareng, Nicholas Race
2017 IEEE Communications Magazine  
This paper contributes the design and operational guidelines for a Software-Defined Networking (SDN) experimentation framework (REF), which enables rapid evaluation of contextual networking designs using  ...  SDN-assisted networking.  ...  Additionally, we are exploring the idea of using creating APIs for other controllers so that a REF application would be portable between controllers.  ... 
doi:10.1109/mcom.2017.1600507 fatcat:duyno5hqsjecxf2xp6n3jyklie

Deep Reinforcement Learning for NFV-based Service Function Chaining in Multi-Service Networks : Invited Paper

Zili Ning, Ning Wang, Rahim Tafazolli
2020 2020 IEEE 21st International Conference on High Performance Switching and Routing (HPSR)  
Depending on the traffic patterns of the background traffic which is statically routed through the traditional IP routing platform, we aim to perform dynamic service function chaining for the foreground  ...  of the background traffic will still be carried based on traditional routing protocols.  ...  The authors would also like to acknowledge the support of the University of Surrey's 5G Innovation Centre (5GIC) (http://www.surrey.ac.uk/5gic) members for this work.  ... 
doi:10.1109/hpsr48589.2020.9098994 dblp:conf/hpsr/NingWT20 fatcat:wqcdjz55ejh73jcjeh6qedwus4

Endpoint-transparent Multipath Transport with Software-defined Networks [article]

Dario Banfi and Olivier Mehani and Guillaume Jourjon and Lukas Schwaighofer and Ralph Holz
2016 arXiv   pre-print
We present a Software Defined Network architecture which automatically sets up multipath forwarding, including solutions for reordering and performance improvement, both at the sending side through multipath  ...  Our results show consistent throughput improvements, thanks to the use of aggregated path capacity.  ...  The Harp network architecture prioritizes foreground traffic and uses multipath to dissipate background transfers [17] .  ... 
arXiv:1608.04579v1 fatcat:fpv5mwoomfgsbmkagojld6vmju

End User Privacy and Policy-Based Networking

Nancy E. Paterson
2014 Journal of Information Policy  
Paterson asserts that the potential risks call for additional vigorous research in this area.  Associate Professor, OCAD University.  ...  Are privacy concerns over end user surveillance by network operators such as AT&T and Verizon, and by "edge providers" such as Google and Amazon, being dangerously overshadowed by the predominant emphasis  ...  Indeed, if SDN is successful, the nuts and bolts of networking will fade into the background, and the needs of applications and subscribers will move into the foreground.  ... 
doi:10.5325/jinfopoli.4.2014.0028 fatcat:hh5tivnzcjhvdhdagg2orxskq4

Got loss?

Daniel Crisan, Robert Birke, Gilles Cressier, Cyriel Minkenberg, Mitch Gusat
2013 Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM - SIGCOMM '13  
We quantify these losses for several common combinations of hypervisors and virtual switches, and show their detrimental effect on application performance.  ...  For larger-scale validation and deeper introspection into zOVN, we developed an OMNeT++ model for accurate cross-layer simulations of a virtualized datacenter, which confirm the validity of our results  ...  Acknowledgements We are deeply indebted to the anonymous reviewers and our shepherd, Amin Vahdat for their helpful feedback; Rami Cohen and Katherine Barabash from IBM 2 HRL for the DOVE-related help;  ... 
doi:10.1145/2486001.2486024 dblp:conf/sigcomm/CrisanBCMG13 fatcat:c4culop7lbfr3hrqwvpumw3tnm

Design and management of DOT: A Distributed OpenFlow Testbed

Arup Raton Roy, Md. Faizul Bari, Mohamed Faten Zhani, Reaz Ahmed, Raouf Boutaba
2014 2014 IEEE Network Operations and Management Symposium (NOMS)  
With the growing adoption of Software Defined Networking (SDN), there is a compelling need for SDN emulators that facilitate experimenting with new SDN-based technologies.  ...  Unfortunately, Mininet [1], the de facto standard emulator for software defined networks, fails to scale with network size and traffic volume.  ...  ACKNOWLEDGEMENT This work was supported by the Natural Science and Engineering Council of Canada (NSERC) in part under its Discovery program and in part under the Smart Applications on Virtual Infrastructure  ... 
doi:10.1109/noms.2014.6838241 dblp:conf/noms/RoyBZAB14 fatcat:es422zoxkbdwpg7ua3qaqntfiu

Context Monitoring for Improved System Performance and QoE [chapter]

Florian Metzger, Tobias Hoßfeld, Lea Skorin-Kapov, Yoram Haddad, Eirini Liotou, Peter Pocta, Hugh Melvin, Vasilios A. Siris, Andrej Zgank, Michael Jarschel
2018 Lecture Notes in Computer Science  
To get a good grip on the basics we first discuss a general framework for context monitoring and define context information, including technical, usage, social, economic, temporal, and physical factors  ...  Whereas some application domains show a certain consensus on the role of system factors, human factors, and context factors, QoE management of multimedia systems and services is still faced with the challenge  ...  This work has been supported/partially supported by the ICT COST Action IC1304-Autonomous Control for a Reliable Internet of Services (ACROSS), November 14, 2013 -November 13, 2017, funded by European  ... 
doi:10.1007/978-3-319-90415-3_2 fatcat:3d4yjaxkk5he3pw33kxqugvnm4

Multimedia Internet of Things: A Comprehensive Survey

Ali Nauman, Yazdan Ahmad Qadri, Muhammad Amjad, Yousaf Bin Zikria, Muhammad Khalil Afzal, Sung Won Kim
2020 IEEE Access  
We also present the need for better routing and Physical-Medium Access Control (PHY-MAC) protocols for M-IoT.  ...  , Fog/Edge computing and Software-Defined-Networks (SDNs).  ...  An efficient, cost-effective traffic and street light control mechanism based on M-IoT is outlined in [90] for smart cities.  ... 
doi:10.1109/access.2020.2964280 fatcat:ilihkpik65bdvblyal6rp7tb2y

Survey on Data Center Networking Technologies

Yoshiaki KIRIHA, Motoo NISHIHARA
2013 IEICE transactions on communications  
The problem is, for example, that bandwidth hungry background flows build up queues at the switches and thus affect the performance of latency sensitive foreground traffic.  ...  From their experimentation, DevoFlow uses 10-53 times fewer flow table entries at an average switch and uses 10-42 times fewer control messages.  ...  He received an M.S. degree in Electrical Engineering from Waseda University in 1987. He then joined NEC, where he worked in the R&D division for over 20 years.  ... 
doi:10.1587/transcom.e96.b.713 fatcat:5wd6vjwuwnbm3bnhczw4otme2y

Research and Innovation Action for the Security of the Internet of Things: The SerIoT Project [chapter]

Joanna Domanska, Erol Gelenbe, Tadek Czachorski, Anastasis Drosou, Dimitrios Tzovaras
2018 Communications in Computer and Information Science  
IoT platforms and devices, honeypots, SDN routers and operator's controller) in order to offer a secure SerIoT platform that can be used to implement secure IoT platforms and networks anywhere and everywhere  ...  Thus, attacks and threats on the content and quality of service of the IoT platforms can have economic, energetic and physical security consequences that go way beyond the traditional Internet's lack of  ...  The SDN framework will use an OpenFlow SDN-Controller that will specify and control routing paths for all given IoT applications.  ... 
doi:10.1007/978-3-319-95189-8_10 fatcat:fv4zav2pqzfpvonhnhnfaau3sa

A Survey on Analyzing Encrypted Network Traffic of Mobile Devices [article]

Ashutosh Bhatiaa, Ankit AgrawalaAyush Bahugunaa, Kamlesh Tiwaria, K. Haribabua, Deepak Vishwakarmab
2020 arXiv   pre-print
After that, we provide an extensive review of state of the art based on the proposed framework.  ...  Beyond traditional use for communication, they are used for many peripheral tasks such as gaming, browsing, and shopping.  ...  This research was supported by the Center for Artificial Intelligence and Robotics (CAIR) lab of Defence Research and Development Organisation (DRDO), India, Bangalore under the CARS scheme.  ... 
arXiv:2006.12352v1 fatcat:cysjaqpqdfbxjn7b2gsy6gyelu

A Survey on Recent Advances in Transport Layer Protocols [article]

Michele Polese, Federico Chiariotti, Elia Bonetto, Filippo Rigotto, Andrea Zanella, Michele Zorzi
2018 arXiv   pre-print
Over the years, the Internet has been enriched with new available communication technologies, for both fixed and mobile networks and devices, exhibiting an impressive growth in terms of performance, with  ...  This paper surveys the main novelties related to transport protocols that have been recently proposed, identifying three main research trends: (i) the evolution of congestion control algorithms, to target  ...  Another interesting development is represented by TCP Low Extra Delay Background Transport (LEDBAT) [58] , a delay-based algorithm developed for BitTorrent traffic: since background traffic should have  ... 
arXiv:1810.03884v1 fatcat:aqoomjapo5ffld4hkvbkv4s4cq

Dart: Divide and Specialize for Fast Response to Congestion in RDMA-based Datacenter Networks [article]

Jiachen Xue, Muhammad Usama Chaudhry, Balajee Vamanan, T. N. Vijaykumar, Mithuna Thottethodi
2019 arXiv   pre-print
For the spatially-localized case, Dart provides fast (under one RTT) response by adding novel switch hardware for in-order flow deflection (IOFD) because RDMA disallows packet reordering on which previous  ...  ., 10x), end-to-end congestion control in the presence of incasts is a challenge.  ...  We initiate short 256-KB incasts from a group of servers every 100 ms to an aggregator server. Meanwhile, we send continuous background traffic from another server to the aggregator.  ... 
arXiv:1805.11158v2 fatcat:adyxip73fjgitluygcsa7c4gju

D2.1 5G Security: Current Status and Future Trends

Grant Millar, Anastasios Kafchitsas, Orestis Mavrooulos, Anastasios Kourtis, George Xilouris, Maria Christopoulou, Stavros Kolometsos, Edgardo Montes De Oca, Huu Nghia Nguyen, Antonio Pastor, Sonia Fernandez, Diego Lopez (+18 others)
2020 Zenodo  
This deliverable aims to provide a basis for the identification of use cases and the development of 5G security enablers in INSPIRE-5Gplus.  ...  cases, and the elicitation of security requirements from relevant stakeholders in 5G; the current status of 5G networks, the solutions state for securing 5G systems, the standardization effort in the  ...  The work in [178] proposes an encrypted malicious traffic detection system based on a sandbox for traffic data collection and labelling malicious and normal flows, and multilayer networks of AEs for  ... 
doi:10.5281/zenodo.3947893 fatcat:bg7jnn5ph5fv3gjp7pqacy3us4

D2.1 5G Security: Current Status and Future Trends

Grant Millar, Anastasios Kafchitsas, Orestis Mavrooulos, Anastasios Kourtis, George Xilouris, Maria Christopoulou, Stavros Kolometsos, Edgardo Montes De Oca, Huu Nghia Nguyen, Antonio Pastor, Sonia Fernandez, Diego Lopez (+18 others)
2020 Zenodo  
This deliverable aims to provide a basis for the identification of use cases and the development of 5G security enablers in INSPIRE-5Gplus.  ...  cases, and the elicitation of security requirements from relevant stakeholders in 5G; the current status of 5G networks, the solutions state for securing 5G systems, the standardization effort in the  ...  The work in [178] proposes an encrypted malicious traffic detection system based on a sandbox for traffic data collection and labelling malicious and normal flows, and multilayer networks of AEs for  ... 
doi:10.5281/zenodo.4569519 fatcat:7aersbhzyrccrn563shazvj4dq
« Previous Showing results 1 — 15 out of 58 results