9 Hits in 6.0 sec

revisiting the open vSwitch dataplane ten years later

William Tu, Yi-Hung Wei, Gianni Antichi, Ben Pfaff
2021 Proceedings of the 2021 ACM SIGCOMM 2021 Conference  
This paper shares our experience in supporting and running the Open vSwitch (OVS) software switch, as part of the NSX product for enterprise data center virtualization used by thousands of VMware customers  ...  We include a thorough performance evaluation and a collection of lessons learned.  ...  Also, the many people contributing to the Open vSwitch community, providing directions to this work, and reviewing and evaluating its performance, including: Sujata Banerjee, Jesper Dangaard Brouer, Mihai  ... 
doi:10.1145/3452296.3472914 fatcat:a6t5cswwfvhinfa5xgeofncwj4

SmartX Multi-View Visibility Framework with Flow-Centric Visibility for SDN-Enabled Multisite Cloud Playground

Muhammad Usman, Muhammad Ahmad Rathore, JongWon Kim
2019 Applied Sciences  
To unify multi-layer visibility, this paper presents a comprehensive extension of SmartX MVF with flow-centric visibility for simultaneously monitoring physical-virtual resources, flows classification,  ...  and virtual resources, flow, and workload layers.  ...  That approach utilized tapping-based flow-layer visibility for collection.  ... 
doi:10.3390/app9102045 fatcat:7zzl3qmt7jd3tlrmii556bmum4

Improving the performance of Virtualized Network Services based on NFV and SDN [article]

The main idea of SDN is to centralize all the control logic of the network on a dedicated server (a.k.a. SDN controller), while the devices are in charge of performing only the packet forwarding  ...  Notably, VLANs are used for the set up of the inter-domain traffic steering.  ...  The NF image varies according to the technology implementing the NF. For instance, it is the VM disk in case of virtual machines, a tgz archive in case of NNFs, and so on.  ... 
doi:10.6092/polito/porto/2707078 fatcat:pewlmijjkrcdfmnjxaearg3aoe

From threats to solutions in data center networks [article]

Thimmaraju Kashyap, Technische Universität Berlin, Technische Universität Berlin, Jean-Pierre Seifert, Stefan Schmid
Furthermore, our state transition and delay model of the switch- controller handshake allows us to design, implement and evaluate a covert timing channel that uses a frame-based transmission scheme for  ...  to a logically centralized controller and ii) use virtualization techniques for multi-tenancy.  ...  In Part II of the dissertation, we focus on the design and implementation of data plane systems for virtual networking in the cloud.  ... 
doi:10.14279/depositonce-9702 fatcat:cjbtmr2jdraulbbp3hcsnfan3q

Distributed services across the network from edge to core [article]

Such a solution enables virtual network appliances (i.e., VMs executing network functions) to be provisioned, allocated a different amount of resources, and possibly moved across data centers in little  ...  First, we consider a data center environment and the deployment of (virtualized) NFs.  ...  Our modelization approach can be applied to devise an estimate of the resources required by the virtualized network function and inter-VMs traffic steering, thus enabling a more accurate VNF performance  ... 
doi:10.6092/polito/porto/2706995 fatcat:j7bweduiajd7hmavf27gfnovay

Context-based security function orchestration for the network edge

Mircea-Mihai Iordache-Sica
The work presented in this thesis aims to identify the unique requirements of security modules implemented as Virtual Network Functions (VNFs), and the associated challenges in providing management and  ...  per second of network traffic.  ...  I would like to express my gratitude for their patience and guidance along this long and arduous process. Acknowledgements ii  ... 
doi:10.5525/gla.thesis.82853 fatcat:hoe6fyebjve6vic7xtwqcf2gzy

Dependable virtualised systems [article]

Jörg Thalheim, University Of Edinburgh, Pramod Bhatotia, Bjoern Franke
Virtual machines and containers are widely used in data centres and in the cloud for software deployment and management.  ...  In this way, you can create "slim" images that contain only the actual application, while all the tools needed for monitoring, testing, and debugging reside in a "fat" image that only needs to be deployed  ...  Conclusion with the hardware rathern than relying on interrupts, and it avoids data copies by mapping DMA regions in the untrusted host memory. Bibliography  ... 
doi:10.7488/era/2485 fatcat:26emp3zbyjfx5brubtam3snf3a

Energy-efficient Transitional Near-* Computing

Pablo Karl Graubner, Mathematik Und Informatik, Freisleben, Bernd (Prof. Dr.)
Studies have shown that communication networks, devices accessing the Internet, and data centers account for 4.6% of the worldwide electricity consumption.  ...  Furthermore, a novel paradigm designed to increase the energy efficiency of near-* computing is proposed: transitional computing.  ...  Typically, computing instances are isolated environments The product of both (a) and (b) reflects the electromecanical efficiency, called True PUE (T P U E = P U E * SP U E).  ... 
doi:10.17192/z2019.0052 fatcat:blcx4sw2d5eljhyj35mehamaha

Dagstuhl Reports, Volume 9, Issue 3, March 2019, Complete Issue [article]

In general, researchers and designers need a complete understanding of how and why vehicle automation failures may occur in order to design interfaces that can support driver mental models.  ...  For example, two seconds is the threshold adopted by government agencies for risky off-road glances [1], but this threshold is based on research conducted in non-automated vehicles.  ...  Transportation Research Part F: Traffic Psychology and Behaviour, (64), July 2019, p. 532-551. 3 A. Lotz, S. Wiese, and N. Russwinkel (2019). SEEV-VM: ACT-R Visual Module based on SEEV theory.  ... 
doi:10.4230/dagrep.9.3 fatcat:2tpapmq2rfdsjpygzyvhw2l6ei