309,393 research outputs found

    On the Fly Orchestration of Unikernels: Tuning and Performance Evaluation of Virtual Infrastructure Managers

    Full text link
    Network operators are facing significant challenges meeting the demand for more bandwidth, agile infrastructures, innovative services, while keeping costs low. Network Functions Virtualization (NFV) and Cloud Computing are emerging as key trends of 5G network architectures, providing flexibility, fast instantiation times, support of Commercial Off The Shelf hardware and significant cost savings. NFV leverages Cloud Computing principles to move the data-plane network functions from expensive, closed and proprietary hardware to the so-called Virtual Network Functions (VNFs). In this paper we deal with the management of virtual computing resources (Unikernels) for the execution of VNFs. This functionality is performed by the Virtual Infrastructure Manager (VIM) in the NFV MANagement and Orchestration (MANO) reference architecture. We discuss the instantiation process of virtual resources and propose a generic reference model, starting from the analysis of three open source VIMs, namely OpenStack, Nomad and OpenVIM. We improve the aforementioned VIMs introducing the support for special-purpose Unikernels and aiming at reducing the duration of the instantiation process. We evaluate some performance aspects of the VIMs, considering both stock and tuned versions. The VIM extensions and performance evaluation tools are available under a liberal open source licence

    Evaluation of Network Architecture and Its Implication on Connectivity and Data Security

    Get PDF
    Networking offers the framework to congregate largely heterogeneous entities so that they can communicate. In this paper we review aspects of Network architectural design that aims to ensure connectivity and data security for network users. Security protocols like the Internet Protocol Security (IPsec) ensures data security for users of a Virtual Private Network which provides encryption, tunneling and authentication services. Virtual Local Area Networks plays a role in network management and security. Access Control lists provides an overview of rights granted to users to access network resources thereby reducing incidence of hacking to the minimum. Combining these techniques in a network would ensure uninterrupted service and data security to network users

    Dynamic edge-caching for mobile users: minimising inter-AS traffic by moving cloud services and VMs

    Get PDF
    In recent years, Cloud technology has revolutionized the way services are delivered to end-users. The advent of truly mobile computing in the form of smart phones and tablets has also driven the demand for Cloud resources in order to compensate for the inherent lack of local resources on these devices. Furthermore, modern mobile devices are equipped with multiple network interfaces and in combination with the rapid deployment of wireless networks, it is expected that they will always have Internet connectivity and access to Cloud resources. In this paper we will focus on traffic management for interactive multimedia services accessed by a mobile user by means of dynamic migration of a Virtual Machine. Network performance measurements are taken from a network of virtualization-enabled hosts that perform live migrations of a Virtual Machine which hosts multimedia content. The data is used as input to an equation that determines whether a migration would be beneficial in terms of traffic localization based on a user's mobility characteristics and network usage patterns. The contribution of this paper lies in the proposed mechanism of managing traffic for interactive services in the context of mobile cloud computing. This helps alleviate the increased network costs introduced by dynamic migrations driven by Quality of Service parameters and may result in increased network traffic for the benefit of improved QoS

    Evaluation of virtual routing appliances as routers virtual environment

    Get PDF
    A virtual routing appliance is a system for the rapid, automated management and employment of virtual networks. Virtual routing appliances utilize virtual machines to enable virtual infrastructure, and they have been used commonly in order to implement experimental networks and devoted subnets over a virtual network. Existing research in this area such as cluster-based virtual routers, and Xen routers require the use of physical resources to establish connectivity and to guarantee efficient resource utilization. The virtual routing appliance uses dynamic routing protocols such as RIP, and OSPF to forward traffic between different subnets and manage IP packets at the IP layer. The virtual routing appliance permits rapidly deployable virtual infrastructure, which is helpful for installing isolated infrastructure for restricted purposes, and which is also vital to the deployment of both network and application services. This research is a self-sufficient initiative to evaluate the feasibility of setting up virtual routing appliances in a virtual environment. A virtual routing appliance can convey about substantial cost benefits to organizations, especially educational institutions with limited use of physical resources

    Scalable RAN Virtualization in Multi-Tenant LTE-A Heterogeneous Networks (Extended version)

    Full text link
    Cellular communications are evolving to facilitate the current and expected increasing needs of Quality of Service (QoS), high data rates and diversity of offered services. Towards this direction, Radio Access Network (RAN) virtualization aims at providing solutions of mapping virtual network elements onto radio resources of the existing physical network. This paper proposes the Resources nEgotiation for NEtwork Virtualization (RENEV) algorithm, suitable for application in Heterogeneous Networks (HetNets) in Long Term Evolution-Advanced (LTE-A) environments, consisting of a macro evolved NodeB (eNB) overlaid with small cells. By exploiting Radio Resource Management (RRM) principles, RENEV achieves slicing and on demand delivery of resources. Leveraging the multi-tenancy approach, radio resources are transferred in terms of physical radio Resource Blocks (RBs) among multiple heterogeneous base stations, interconnected via the X2 interface. The main target is to deal with traffic variations in geographical dimension. All signaling design considerations under the current Third Generation Partnership Project (3GPP) LTE-A architecture are also investigated. Analytical studies and simulation experiments are conducted to evaluate RENEV in terms of network's throughput as well as its additional signaling overhead. Moreover we show that RENEV can be applied independently on top of already proposed schemes for RAN virtualization to improve their performance. The results indicate that significant merits are achieved both from network's and users' perspective as well as that it is a scalable solution for different number of small cells.Comment: 40 pages (including Appendices), Accepted for publication in the IEEE Transactions on Vehicular Technolog

    Resource Management in a Peer to Peer Cloud Network for IoT

    Get PDF
    Software-Defined Internet of Things (SDIoT) is defined as merging heterogeneous objects in a form of interaction among physical and virtual entities. Large scale of data centers, heterogeneity issues and their interconnections have made the resource management a hard problem specially when there are different actors in cloud system with different needs. Resource management is a vital requirement to achieve robust networks specially with facing continuously increasing amount of heterogeneous resources and devices to the network. The goal of this paper is reviews to address IoT resource management issues in cloud computing services. We discuss the bottlenecks of cloud networks for IoT services such as mobility. We review Fog computing in IoT services to solve some of these issues. It provides a comprehensive literature review of around one hundred studies on resource management in Peer to Peer Cloud Networks and IoT. It is very important to find a robust design to efficiently manage and provision requests and available resources. We also reviewed different search methodologies to help clients find proper resources to answer their needs
    • …
    corecore