Search results for "Virtual network"

showing 9 items of 9 documents

Scalable Virtual Network Video-Optimizer for Adaptive Real-Time Video Transmission in 5G Networks

2020

The increasing popularity of video applications and ever-growing high-quality video transmissions (e.g., 4K resolutions), has encouraged other sectors to explore the growth of opportunities. In the case of health sector, mobile Health services are becoming increasingly relevant in real-time emergency video communication scenarios where a remote medical experts’ support is paramount to a successful and early disease diagnosis. To minimize the negative effects that could affect critical services in a heavily loaded network, it is essential for 5G video providers to deploy highly scalable and priorizable in-network video optimization schemes to meet the expectations of a large quantity of vide…

MultitenancyComputer Networks and CommunicationsComputer sciencebusiness.industryQuality of serviceTestbed020206 networking & telecommunications02 engineering and technologyVideo processingVideo optimizationScalability0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringbusinessVirtual network5GComputer networkIEEE Transactions on Network and Service Management
researchProduct

On Detection of Network-Based Co-residence Verification Attacks in SDN-Driven Clouds

2017

Modern cloud environments allow users to consume computational and storage resources in the form of virtual machines. Even though machines running on the same cloud server are logically isolated from each other, a malicious customer can create various side channels to obtain sensitive information from co-located machines. In this study, we concentrate on timely detection of intentional co-residence attempts in cloud environments that utilize software-defined networking. SDN enables global visibility of the network state which allows the cloud provider to monitor and extract necessary information from each flow in every virtual network in online mode. We analyze the extracted statistics on d…

021110 strategic defence & security studiesbusiness.industryComputer scienceVisibility (geometry)0211 other engineering and technologiesBotnetCloud computingcloud environments02 engineering and technologycomputer.software_genrepilvipalvelutInformation sensitivityMode (computer interface)Virtual machine0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingState (computer science)co-residence detectiontietoturvavirtual networksbusinessVirtual networkcomputerComputer network
researchProduct

Data Stream Clustering for Application-Layer DDoS Detection in Encrypted Traffic

2018

Application-layer distributed denial-of-service attacks have become a serious threat to modern high-speed computer networks and systems. Unlike network-layer attacks, application-layer attacks can be performed using legitimate requests from legitimately connected network machines that make these attacks undetectable by signature-based intrusion detection systems. Moreover, the attacks may utilize protocols that encrypt the data of network connections in the application layer, making it even harder to detect an attacker’s activity without decrypting users’ network traffic, and therefore violating their privacy. In this paper, we present a method that allows us to detect various application-l…

Web serverbusiness.industryComputer scienceNetwork packetDenial-of-service attackIntrusion detection systemEncryptioncomputer.software_genreApplication layerData stream clusteringbusinesscomputerVirtual networkComputer network
researchProduct

Virtual Environment for Implementation and Testing Private Wide Area Network Solutions

2013

In this paper the concept of virtual environment for implementation and testing private Wide Area Network (WAN) solutions is presented. The VMware vSphere virtualization platform is used. The paper presents the ability to reflect the structure of any given WAN topology using Vyatta software routers and VMware virtualization platform and verifies its reliability regarding data transfer. The paper includes a number of performance tests to verify the dependability of the proposed solution and provide a proof-of-concept for the network topology during the Design phase of the PPDIOO methodology, right before the Implementation phase.

Computer sciencebusiness.industryReliability (computer networking)Virtualizationcomputer.software_genreNetwork topologyWide area networkVirtual machineDependabilityEnterprise private networkbusinesscomputerVirtual networkComputer network
researchProduct

Incentive Mechanism for Resource Allocation in Wireless Virtualized Networks with Multiple Infrastructure Providers

2020

To accommodate the explosively growing demands for mobile traffic service, wireless network virtualization is proposed as the main evolution towards 5G. In this work, a novel contract theoretic incentive mechanism is proposed to study how to manage the resources and provide services to the users in the wireless virtualized networks. We consider that the infrastructure providers (InPs) own the physical networks and the mobile virtual network operator (MVNO) has the service information of the users and needs to lease the physical radio resources for providing services. In particular, we utilize the contract theoretic approach to model the resource trading process between the MVNO and multiple…

Computer Networks and CommunicationsComputer sciencewireless virtualized networkcontract theory02 engineering and technologyresursointicomputer.software_genreresurssitallokointiResource (project management)0202 electrical engineering electronic engineering information engineeringWirelessResource managementElectrical and Electronic EngineeringVirtual networkuser associationbusiness.industryWireless network020206 networking & telecommunicationsVirtualizationpower allocationResource allocationbusinesscomputerSoftware5Glangattomat verkotkannustimetComputer network
researchProduct

The pragmatics of political messages in twitter communication

2012

The aim of the current paper is to formulate a conception of pragmatic patterns characterizing the construction of individual and collective identities in virtual communities (in our case: the Twitter community). We have explored several theoretical approaches and frameworks and relevant empirical data to show that the agents building virtual communities are 'extended selves' grounded in a highly dynamic and compressed, linguistically mediated virtual network structure. Our empirical evidence consists of a study of discourse related to the Latvian parliamentary elections of 2010. We used a Twitter corpus (in Latvian) harvested and statistically evaluated using the Pointwise Mutual Informati…

Computer sciencebusiness.industryOpinion leadershipLatvianPragmaticsPointwise mutual informationPublic relationslanguage.human_languageWorld Wide WebCollective identityGeneral electionlanguagebusinessEmpirical evidenceVirtual network
researchProduct

Feasibility of FPGA accelerated IPsec on cloud

2018

Abstract Hardware acceleration for famous VPN solution, IPsec, has been widely researched already. Still it is not fully covered and the increasing latency, throughput, and feature requirements need further evaluation. We propose an IPsec accelerator architecture in an FPGA and explain the details that need to be considered for a production ready design. This research considers the IPsec packet processing without IKE to be offloaded on an FPGA in an SDN network. Related work performance rates in 64 byte packet size for throughput is 1–2 Gbps with 0.2 ms latency in software, and 1–4 Gbps with unknown latencies for hardware solutions. Our proposed architecture is capable to host 1000 concurre…

Network securityComputer Networks and CommunicationsComputer sciencecomputer.internet_protocolPacket processingCloud computing02 engineering and technologycomputer.software_genreEncryptionGeneralLiterature_MISCELLANEOUSArtificial IntelligenceServer0202 electrical engineering electronic engineering information engineeringField-programmable gate arrayVirtual network0505 lawbusiness.industryNetwork packet05 social sciencesComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020208 electrical & electronic engineeringByteVirtualization020202 computer hardware & architectureHardware and ArchitectureEmbedded systemIPsec050501 criminologyHardware accelerationbusinesscomputerSoftwareMicroprocessors and Microsystems
researchProduct

American Options Based Service Pricing For Virtual Operators

2008

In the recent years, the role of service provider has split into two broad categories: Network Operators, offering services over their networks, and Virtual Operators, providing services over leased resources. What differentiates these players is to a minor extent a matter of enhanced service offer, and primarily a matter of economic objectives and risk attitudes. Essentially, Network Operators own their infrastructures and typically have to sustain both fixed costs (CAPEX) and recurrent costs (OPEX), while Virtual Operators may have a simpler cost structure, mainly consisting of OPEX for hiring the network. Correspondingly, the objectives of these players may differ profoundly: on one hand…

Service (business)Operations researchComputer scienceQuality of serviceService providerCongestion pricingOperating expenseComputer securitycomputer.software_genreFixed costEnhanced serviceVirtual networkcomputer
researchProduct

Service Provisioning with Multiple Service Providers in 5G Ultra-dense Small Cell Networks

2015

In this work, a game theoretical approach for addressing the virtual network service providers (NSPs), small cell provider (SCP) and user interaction in heterogenous small cell networks is presented. In particular, we consider the users can select the services of different NSPs based on their prices. The NSPs have no dedicated hardware and need to rent from the SCP in term of radio resources, e.g., small cell base stations (SBSs) in order to provide satisfied services to the users. Due to the fact that the selfish parties involved aim at maximizing their own profits, a hierarchical dynamic game framework is presented to address interactive decision problem. In the lower-level, a Stackelberg…

game theorySequential gameta213Wireless networkbusiness.industryComputer scienceMobile computingheterogenous servicesmall cell networkshinnoitteluService providernon-atomic gameProfit (economics)Base stationPricing strategiesStackelberg competitionpricingpeliteoriaSmall cellbusinessVirtual networkcompetitionComputer network
researchProduct