279 research outputs found

    ARNAB: Transparent Service Continuity across Orchestrated Edge Networks

    Get PDF
    Paper presented at: IEEE GLOBECOM 2018 Workshops: Intelligent Network orchestration and interaction in 5G and beyond. Abu Dabhi. 9-13 December 2018In this paper, we present an architecture for transparent service continuity for cloud-enabled WiFi networks called ARNAB: ARchitecture for traNsparent service continuity viA douBle-tier migration. The term arnab means rabbit in Arabic. It is dubbed for the proposed service architecture because a mobileuser service with ARNAB behaves like a rabbit hopping through the WiFi infrastructure. To deliver continuous services, deploying edge clouds is not sufficient. Users may travel far from the initial serving edge and also perform multiple WiFi handoffs during mobility. To solve this, ARNAB employs a double-tier migration scheme. One migration tier is for user connectivity, and the other one is for edge applications. Our experimental results show that ARNAB can not only enable continuous service delivery but also outperform the existing work in the area of container live migration across edge clouds.This work has been partially supported by the H2020 collaborative Europe/Taiwan research project 5G-CORAL (grant num. 761586)

    Enabling Mobile Service Continuity across Orchestrated Edge Networks

    Get PDF
    Edge networking has become an important technology for providing low-latency services to end users. However, deploying an edge network does not guarantee continuous service for mobile users. Mobility can cause frequent interruptions and network delays as users leave the initial serving edge. In this paper, we propose a solution to provide transparent service continuity for mobile users in large-scale WiFi networks. The contribution of this work has three parts. First, we propose ARNAB architecture to achieve mobile service continuity. The term ARNAB means rabbit in Arabic, which represents an Architecture for Transparent Service Continuity via Double-tier Migration. The first tier migrates user connectivity, while the second tier migrates user containerized applications. ARNAB provides mobile services just like rabbits hop through the WiFi infrastructure. Second, we identify the root-causes for prolonged container migration downtime. Finally, we enhance the container migration scheme by improving system response time. Our experimental results show that the downtime of ARNAB container migration solution is 50% shorter than that of the state-of-the-art migration.This work has been partially funded by the H2020 Europe/Taiwan joint action 5G-DIVE (Grant #859881) and also partially funded by the Ministry of Science and Technology, under the Grant Number MOST 108-2634-F-009-006 - through Pervasive Artificial Intelligence Research (PAIR) Labs, Taiwan

    Platforms and software systems for an autonomic internet

    Get PDF
    The current Internet does not enable easy introduction and deployment of new network technologies and services. This paper aims to progress the Future Internet (FI) by introduction of a service composition and execution environment that re-use existing components of access and core networks. This paper presents essential service-centric platforms and software systems that have been developed with the aim to create a flexible environment for an Autonomic Internet.Peer ReviewedPostprint (published version

    A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks

    Get PDF
    Social engineering is used as an umbrella term for a broad spectrum of computer exploitations that employ a variety of attack vectors and strategies to psychologically manipulate a user. Semantic attacks are the specific type of social engineering attacks that bypass technical defences by actively manipulating object characteristics, such as platform or system applications, to deceive rather than directly attack the user. Commonly observed examples include obfuscated URLs, phishing emails, drive-by downloads, spoofed web- sites and scareware to name a few. This paper presents a taxonomy of semantic attacks, as well as a survey of applicable defences. By contrasting the threat landscape and the associated mitigation techniques in a single comparative matrix, we identify the areas where further research can be particularly beneficial

    SDN-Based Channel Assignment Algorithm for Interference Management in Dense Wi-Fi Networks

    Get PDF
    The popularity of Wi-Fi-enabled devices alongside the growing demand for non-licensed spectrum, has made the Wi-Fi networks exceedingly congested. This endangers the efficiency of Wi-Fi and negatively affect the users' experience. The problem is especially pressing in dense areas (e.g. shopping centers) where Wi-Fi channel assignment is more likely to be uncoordinated and the working environment of Wi-Fi Access Points (APs) has become increasingly time-variant. As a result, the availability of Software-Defined Networking (SDN) and network virtualization technologies has motivated the use of centralized resource management as a solution. This paper provides an algorithm for channel assignment functionality in the context of SDN-based centralized resource management, which captures the live status of a Wi-Fi network and is capable of optimising the Radio Frequency (RF) channel assignment process. The APs' network arrangement, the current assignment of the channels and the characteristics of the RF channels in IEEE 802.11 have all been taken into account in the proposed model. The performance of the proposed model in terms of the level of the interference, the spectral efficiency at each AP and the Signal to Interference plus Noise Ratio (SINR) at the user-side is evaluated through simulation and compared against state of the art solutions

    Can a Wi-Fi WLAN support a first person shooter?

    Get PDF
    In corporate and commercial environments, the deployment of a set of coordinated Wi-Fi APs is becoming a common solution to provide Internet coverage to moving users. In these scenarios, real-time services as online games can also be present. This paper presents a set of experiments developed in a test scenario where an end device moves between different APs while generating game traffic. A WLAN solution based on virtual APs is used, in order to make the handoffs transparent for Layer 3. The results show that it is possible to maintain an acceptable level of subjective quality during the handoff. At the same time, it is set clear that the fact of having a gamer in an AP could be taken into account by radio resource management algorithms, in order to provide a better quality
    • …
    corecore