Search results for "Virtual network"
showing 9 items of 9 documents
Scalable Virtual Network Video-Optimizer for Adaptive Real-Time Video Transmission in 5G Networks
2020
The increasing popularity of video applications and ever-growing high-quality video transmissions (e.g., 4K resolutions), has encouraged other sectors to explore the growth of opportunities. In the case of health sector, mobile Health services are becoming increasingly relevant in real-time emergency video communication scenarios where a remote medical experts’ support is paramount to a successful and early disease diagnosis. To minimize the negative effects that could affect critical services in a heavily loaded network, it is essential for 5G video providers to deploy highly scalable and priorizable in-network video optimization schemes to meet the expectations of a large quantity of vide…
On Detection of Network-Based Co-residence Verification Attacks in SDN-Driven Clouds
2017
Modern cloud environments allow users to consume computational and storage resources in the form of virtual machines. Even though machines running on the same cloud server are logically isolated from each other, a malicious customer can create various side channels to obtain sensitive information from co-located machines. In this study, we concentrate on timely detection of intentional co-residence attempts in cloud environments that utilize software-defined networking. SDN enables global visibility of the network state which allows the cloud provider to monitor and extract necessary information from each flow in every virtual network in online mode. We analyze the extracted statistics on d…
Data Stream Clustering for Application-Layer DDoS Detection in Encrypted Traffic
2018
Application-layer distributed denial-of-service attacks have become a serious threat to modern high-speed computer networks and systems. Unlike network-layer attacks, application-layer attacks can be performed using legitimate requests from legitimately connected network machines that make these attacks undetectable by signature-based intrusion detection systems. Moreover, the attacks may utilize protocols that encrypt the data of network connections in the application layer, making it even harder to detect an attacker’s activity without decrypting users’ network traffic, and therefore violating their privacy. In this paper, we present a method that allows us to detect various application-l…
Virtual Environment for Implementation and Testing Private Wide Area Network Solutions
2013
In this paper the concept of virtual environment for implementation and testing private Wide Area Network (WAN) solutions is presented. The VMware vSphere virtualization platform is used. The paper presents the ability to reflect the structure of any given WAN topology using Vyatta software routers and VMware virtualization platform and verifies its reliability regarding data transfer. The paper includes a number of performance tests to verify the dependability of the proposed solution and provide a proof-of-concept for the network topology during the Design phase of the PPDIOO methodology, right before the Implementation phase.
Incentive Mechanism for Resource Allocation in Wireless Virtualized Networks with Multiple Infrastructure Providers
2020
To accommodate the explosively growing demands for mobile traffic service, wireless network virtualization is proposed as the main evolution towards 5G. In this work, a novel contract theoretic incentive mechanism is proposed to study how to manage the resources and provide services to the users in the wireless virtualized networks. We consider that the infrastructure providers (InPs) own the physical networks and the mobile virtual network operator (MVNO) has the service information of the users and needs to lease the physical radio resources for providing services. In particular, we utilize the contract theoretic approach to model the resource trading process between the MVNO and multiple…
The pragmatics of political messages in twitter communication
2012
The aim of the current paper is to formulate a conception of pragmatic patterns characterizing the construction of individual and collective identities in virtual communities (in our case: the Twitter community). We have explored several theoretical approaches and frameworks and relevant empirical data to show that the agents building virtual communities are 'extended selves' grounded in a highly dynamic and compressed, linguistically mediated virtual network structure. Our empirical evidence consists of a study of discourse related to the Latvian parliamentary elections of 2010. We used a Twitter corpus (in Latvian) harvested and statistically evaluated using the Pointwise Mutual Informati…
Feasibility of FPGA accelerated IPsec on cloud
2018
Abstract Hardware acceleration for famous VPN solution, IPsec, has been widely researched already. Still it is not fully covered and the increasing latency, throughput, and feature requirements need further evaluation. We propose an IPsec accelerator architecture in an FPGA and explain the details that need to be considered for a production ready design. This research considers the IPsec packet processing without IKE to be offloaded on an FPGA in an SDN network. Related work performance rates in 64 byte packet size for throughput is 1–2 Gbps with 0.2 ms latency in software, and 1–4 Gbps with unknown latencies for hardware solutions. Our proposed architecture is capable to host 1000 concurre…
American Options Based Service Pricing For Virtual Operators
2008
In the recent years, the role of service provider has split into two broad categories: Network Operators, offering services over their networks, and Virtual Operators, providing services over leased resources. What differentiates these players is to a minor extent a matter of enhanced service offer, and primarily a matter of economic objectives and risk attitudes. Essentially, Network Operators own their infrastructures and typically have to sustain both fixed costs (CAPEX) and recurrent costs (OPEX), while Virtual Operators may have a simpler cost structure, mainly consisting of OPEX for hiring the network. Correspondingly, the objectives of these players may differ profoundly: on one hand…
Service Provisioning with Multiple Service Providers in 5G Ultra-dense Small Cell Networks
2015
In this work, a game theoretical approach for addressing the virtual network service providers (NSPs), small cell provider (SCP) and user interaction in heterogenous small cell networks is presented. In particular, we consider the users can select the services of different NSPs based on their prices. The NSPs have no dedicated hardware and need to rent from the SCP in term of radio resources, e.g., small cell base stations (SBSs) in order to provide satisfied services to the users. Due to the fact that the selfish parties involved aim at maximizing their own profits, a hierarchical dynamic game framework is presented to address interactive decision problem. In the lower-level, a Stackelberg…