7,568 research outputs found

    WirePlanner: Fast, Secure and Cost-Efficient Route Configuration for SD-WAN

    Full text link
    As enterprises increasingly migrate their applications to the cloud, the demand for secure and cost-effective Wide Area Networking (WAN) solutions for data transmission between branches and data centers grows. Among these solutions, Software-Defined Wide Area Networking (SD-WAN) has emerged as a promising approach. However, existing SD-WAN implementations largely rely on IPSec tunnels for data encryption between edge routers, resulting in drawbacks such as extended setup times and limited throughput. Additionally, the SD-WAN control plane rarely takes both latency and monetary cost into consideration when determining routes between nodes, resulting in unsatisfactory Quality of Service (QoS). We propose WirePlanner, an SD-WAN solution that employs a novel algorithm for path discovery, optimizing both latency and cost, and configures WireGuard tunnels for secure and efficient data transmission. WirePlanner considers two payment methods: Pay-As-You-Go, where users pay for a fixed amount of bandwidth over a certain duration, and Pay-For-Data-Transfer, where users pay for the volume of transmitted data. Given an underlay topology of edge routers and a user-defined budget constraint, WirePlanner identifies a path between nodes that minimizes latency and remains within the budget, while utilizing WireGuard for secure data transmission

    Techno-Economic Assessment in Communications: New Challenges

    Full text link
    This article shows a brief history of Techno-Economic Assessment (TEA) in Communications, a proposed redefinition of TEA as well as the new challenges derived from a dynamic context with cloud-native virtualized networks, the Helium Network & alike blockchain-based decentralized networks, the new network as a platform (NaaP) paradigm, carbon pricing, network sharing, and web3, metaverse and blockchain technologies. The authors formulate the research question and show the need to improve TEA models to integrate and manage all this increasing complexity. This paper also proposes the characteristics TEA models should have and their current degree of compliance for several use cases: 5G and beyond, software-defined wide area network (SD-WAN), secure access service edge (SASE), secure service edge (SSE), and cloud cybersecurity risk assessment. The authors also present TEA extensibility to request for proposals (RFP) processes and other industries, to conclude that there is an urgent need for agile and effective TEA in Comms that allows industrialization of agile decision-making for all market stakeholders to choose the optimal solution for any technology, scenario and use case.Comment: 18 pages, 1 figure, 2 table

    Analysis about benefits of software-defined wide area network: a new alternative for WAN connectivity

    Get PDF
    This article is based on conducting research to analyze the benefits of emerging trends in communications and networking technology, such as software-defined wide area networks. Using Waterfall as a methodology, the main objective is to carry out a technical comparison at the design and configuration level, creating a virtual environment that simulates traditional and SDWAN (Software-Defined Wide Area Network) infrastructures. The results obtained verify that the benefits of SDWAN maintain business continuity, anticipate situations in which the infrastructure can act intelligently, optimize connectiv-ity while maintaining security, and provide improvements in the management of the entire infrastructure. People will be able to see the results obtained between both technologies and validate the benefits that SDWAN offers .Campus Lima Centr

    The journey from 5G towards 6G

    Get PDF
    This paper gives an overview of the journey from 5G towards 6G evolution. The 5G has been built across three main application verticals as defined by ITU, namely: Enhanced Mobile Broadband, Massive Machine Type Communications and Ultra-reliable Low Latency Communications (URRLC). To support these verticals, 5G has defined the following enablers: Massive MIMO, cloudification of network infrastructure, network automation, network slicing and edge cloud computing. It is expected that 5G will provide flexibility in terms of openness, mobility, programmability and agility and robustness in a standardized manner. The journey towards 6G will describe the limitations of 5G technologies and outlines the technology enablers for 6G. These enablers include smooth integration and interworking of Non-Terrestrial Networking technologies (NTN), use of Reconfigurable Intelligent Surfaces (RIS) and use of AI to orchestrate network and cloud resources. Additionally, the paper will give an overview of 6G research initiatives at both regional and international level

    Towards Safe Load Balancing based on Control Barrier Functions and Deep Reinforcement Learning

    Full text link
    Deep Reinforcement Learning (DRL) algorithms have recently made significant strides in improving network performance. Nonetheless, their practical use is still limited in the absence of safe exploration and safe decision-making. In the context of commercial solutions, reliable and safe-to-operate systems are of paramount importance. Taking this problem into account, we propose a safe learning-based load balancing algorithm for Software Defined-Wide Area Network (SD-WAN), which is empowered by Deep Reinforcement Learning (DRL) combined with a Control Barrier Function (CBF). It safely projects unsafe actions into feasible ones during both training and testing, and it guides learning towards safe policies. We successfully implemented the solution on GPU to accelerate training by approximately 110x times and achieve model updates for on-policy methods within a few seconds, making the solution practical. We show that our approach delivers near-optimal Quality-of-Service (QoS performance in terms of end-to-end delay while respecting safety requirements related to link capacity constraints. We also demonstrated that on-policy learning based on Proximal Policy Optimization (PPO) performs better than off-policy learning with Deep Deterministic Policy Gradient (DDPG) when both are combined with a CBF for safe load balancing.Comment: Accepted to IEEE/IFIP NOMS 202

    Routing policy validation for the integrated system supporting routing in Software Defined Networks (SDNRoute)

    Get PDF
    In the article, a validation module, being a component of an integrated system supporting routing in software defined networks (SDNRoute), is proposed and thoroughly examined. The module allows for the verification of the results provided by the optimization module before these results are deployed in the production network. Routing policies are validated for their impact on the network quality parameters and against the threat of overloading (congestion)

    La seguridad en redes SDN y sus aplicaciones

    Get PDF
    Introduction: The review article is the product of the research on Security in SDN networks and their applications, developed at the District University in 2020, presenting the latest advances, that have been made in security. Problem: The security weaknesses that SDN networks have had, due to being a new architecture. This has not allowed traditional networks to be replaced.   Objective: To carry out a review of the state of the art of SDN networks, focusing research on the security of the control layer and its advances. Methodology: The descriptive method is implemented, consulting databases such as Scopus, IEEE and ScienceDirect, using the following search criteria: SDN networks, security in SDN networks, applications with SDN networks and OpenFlow protocol. It is shown as a research sample: the Asian, European and American continents with years of research from 2014 to 2020. Results: Great advances have been made in terms of security for SDN networks, which allows us to see an early solution to the weaknesses that it currently faces.   Conclusion: SDN networks will solve all the challenges they face and will be consolidated as a solid and reliable architecture.   Originality: an important focus is taken on the security of SDN networks and the great development that has occurred in this regard is evident.   Limitations: SDN networks are a new architecture, so their development has been very little and advances in security have been significantly affected.Introducción: El artículo de revisión es producto de la investigación Seguridad en redes SDN y sus aplicaciones, desarrollada en la Universidad Distrital en el año 2020, presentando los últimos avances que se han logrado en seguridad. Problema: Las debilidades en seguridad que han tenido las redes SDN debido a ser una arquitectura nueva, esto no ha permitido que se reemplacen las redes tradicionales. Objetivo: realizar una revisión del estado del arte de las redes SDN enfocando la investigación la seguridad de la capa de control y sus avances. Metodología: se emplea el método descriptivo, se consultaron bases de datos como Scopus, IEEE y ScienceDirect, utilizando los siguientes criterios de búsqueda: SDN networks, security in SDN networks, applications with SDN networks y OpenFlow protocol, se tomó como muestra de investigación a los continentes asiático, europeo y americano con años de investigación desde el año 2014 hasta el año 2020. Resultados: se han desarrollado grandes avances en seguridad para las redes SDN, lo que permite ver una pronta solución a las debilidades que afronta en la actualidad. Conclusión: las redes SDN lograran resolver todos los retos a los que se enfrentan y se consolidara como una arquitectura sólida y confiable. Originalidad: se realiza un enfoque importante en la seguridad de las redes SDN y se evidencia el gran desarrollo que se ha presentado en este aspecto. Limitaciones: las redes SDN son una arquitectura nueva por lo que su desarrollo ha sido muy poco y los avances en seguridad se vieron afectados significativamente
    corecore