10 research outputs found

    Self-* Features for Semantic Networking

    Get PDF
    http://www.fitramen.eu/program.htmInternational audienceWe propose the Semantic Networking concept as a candidate for the Internet of the Future. Re-thinking of the architectural and functional paradigms is needed to face scalability and complexity issues in the current Internet developments. A fundamental of our proposal is to reconsider all the networking and service operations based on the flow granularity, thus beyond packet or circuit paradigms. This is enabled by the awareness of the transported traffic, thanks to a combined Deep Packet Inspection and Behavioral Analysis approach. Together with the flow-based and traffic-aware features, Autonomic Networking is considered as a pillar of this concept which leads in turn to specific requirements. This paper is an introduction to autonomic features which should be instantiated as per the Semantic Networking goals, within the traffic-aware data plane ("Semantic Analysis", "Elastic Fluid Switching"), the flow-based control plane ("Flow Admission Control", "Flow Policing", "Traffic Aware Routing"), and the self-management plane ("Network Mining", "Knowledge Plane"). We describe each of these functional building blocks, their interactions, the requirements for their autonomic (or self-*) features, and their localization in transport network nodes to transform them into "semantic network nodes"

    Resolving the Fairness Issues in Bus-Based Optical Access Networks

    No full text
    International audiencePacket-based optical access ring is becoming a promising solution in metropolitan networks. Its performance de-pends mainly on how optical resource sharing takes place among the different competing access nodes. This network architecture has mostly been explored with regard to synchronous transmission, i.e., slotted wavelength-division multiplexing (WDM) ring. However, in this paper, we focus on the performance of asynchronous transmission-based networks with variable packet sizes. Analytical models are presented in an attempt to provide explicit formulas that express the mean access delay of each node of the bus-based optical access network. We prove that in such a net-work, fairness problems are likely to arise between upstream and downstream nodes sharing a common data channel. Furthermore, we show that sharing the channel’s available bandwidth fairly but arbitrarily between access nodes, as in slotted WDM rings, does not resolve the fairness problem in asynchronous system. In this regard, we exhibit the inherent limitations of the token bucket access rate-based algorithm once applied to asynchronous transmission bus-based networks. To alleviate the aforementioned problem, we device a new strategy called traffic control architecture using remote descriptors. The proposed solution is based on a preventive mechanism to grant access to the shared resource. As illustrated in this paper, the proposed solution alleviates the performance degradation and the resource underutilization, while achieving fairness among bus nodes

    Resolving the Fairness Issues in Bus-Based Optical Access Networks

    No full text
    International audiencePacket-based optical access ring is becoming a promising solution in metropolitan networks. Its performance depends mainly on how optical resource sharing takes place among the different competing access nodes. This network architecture has mostly been explored with regard to synchronous transmission, i.e., slotted wavelength-division multiplexing (WDM) ring. However, in this paper, we focus on the performance of asynchronous transmission-based networks with variable packet sizes. Analytical models are presented in an attempt to provide explicit formulas that express the mean access delay of each node of the bus-based optical access network. We prove that in such a network, fairness problems are likely to arise between upstream and downstream nodes sharing a common data channel. Furthermore, we show that sharing the channel's available bandwidth fairly but arbitrarily between access nodes, as in slotted WDM rings, does not resolve the fairness problem in asynchronous system. In this regard, we exhibit the inherent limitations of the token bucket access rate-based algorithm once applied to asynchronous transmission bus-based networks. To alleviate the aforementioned problem, we device a new strategy called traffic control architecture using remote descriptors. The proposed solution is based on a preventive mechanism to grant access to the shared resource. As illustrated in this paper, the proposed solution alleviates the performance degradation and the resource underutilization, while achieving fairness among bus nodes

    Key Strategies for 6G Smart Networks and Services

    No full text
    <p>The purpose of this document is to provide a first comprehensive set of key strategic reflections and recommendations for 6G smart networks and services, capturing the views and priorities from the members of the 6G-IA. The goal is that this document will be used to further elaborate future versions of the SNS JU Strategic Research and Innovation Agenda (SRIA) as well as the R&I Work Programmes. It also aims to offer directions for collaboration opportunities for European Stakeholders that will go beyond the scope of the SNS JU. It is the plan of 6G-IA to use this as a “living document” where topics will be updated or highlighted (by producing specific strategic documents) in the coming years, following the technological advances, market uptake and ecosystem evolution.</p&gt

    Key Strategies for 6G Smart Networks and Services

    No full text
    <p>The purpose of this document is to provide a first comprehensive set of key strategic reflections and recommendations for 6G smart networks and services, capturing the views and priorities from the members of the 6G-IA. The goal is that this document will be used to further elaborate future versions of the SNS JU Strategic Research and Innovation Agenda (SRIA) as well as the R&I Work Programmes. It also aims to offer directions for collaboration opportunities for European Stakeholders that will go beyond the scope of the SNS JU. It is the plan of 6G-IA to use this as a “living document” where topics will be updated or highlighted (by producing specific strategic documents) in the coming years, following the technological advances, market uptake and ecosystem evolution.</p&gt

    5G-ENSURE - D3.2 5G-PPP security enablers open specifications (v1.0)

    No full text
    This document describes the open specifications of 5G Security enablers planned to compose the first software release (i.e. v1.0) of 5G-ENSURE Project due in September 2016 (M11). The enablers’ open specifications are presented per security areas in scope of the project, namely: Authentication, Authorization and Accounting (AAA), Privacy, Trust, Security Monitoring, and Network management & virtualisation isolation. For each of these categories the open specifications of all enablers planned in the project's Technical Roadmap for v1.0 and having features for v1.0 are detailed following the same template. Overall, this deliverable paves the way towards the development and demonstration of the first set of 5G-ENSURE security enablers as planned for v1.0 in the project's Technical Roadmap (i.e. D3.1). It is also a valuable input to both works on the 5G Security architecture and 5G Security testbed, since it provides the details regarding security enablers necessary in order to understand their mapping to 5G security architectural components, as well as their integration, testing, demonstration, and assessment on the 5G security testbe

    5G-ENSURE - D3.1 5G-PPP security enablers technical roadmap (early vision)

    No full text
    This document provides an early vision (at M4) of the 5G security and privacy enablers proposed by the 5G-ENSURE project, and that are planned to be developed through two major releases: v1.0 (R1) due at M11/Sep’16 and v2.0 (R2) due at M22/Aug’17. It details the Technical Roadmap for v1.0 (R1) in terms of enablers in scope and their features, while providing insights for v2.0 (R2) enablers that will be fully detailed in an update of this deliverable (D3.5 due at M13/Nov’16) taking account of the progress and achievements made by that time. Enablers envisioned are here presented organized in categories, which represent major security areas recognized as topmost priorities for 5G-PPP & 5G Security: Authentication, Authorization and Accountability (AAA); Privacy; Trust; Security Monitoring and Network management & virtualization isolation. They are also presented following a common template covering each of the following key aspects: product vision, technology area, security aspects, security challenges, technical roadmap for first release vs. next release.In the AAA category the main focus is on 5G users’ authentication, authorization and accounting, but the contribution of the AAA enablers goes beyond the incremental improvements to security that one would expect in a next-generation network. The evolving 5G network will support an unpredictable number of devices due to the boom of Internet of Things (IoT), whose security these enablers will aim to address. Moreover, the enablers target to integrate authentication and authorization functions between satellite and terrestrial systems.The main objective of the 5G-Ensure Privacy enablers is to identify in advance 5G user privacy requirements and to provide security mechanisms able to prevent privacy violations by adopting a proactive, privacy-by-design approach. For each 5G use case, the privacy mitigation technology (e.g., anonymity by using temporary identity, access control mechanisms, new encryption system and procedures, etc.) was also investigated so as to satisfy privacy requirements. The privacy enablers aim to enhance user data protection by proposing solutions at several layers: at the network layer, as well as application layer, i.e., privacy as a service.The Trust category will provide trust models which will address the complex relationships between the many actors in 5G networks including the machine-to-machine interactions characterising the next generation networks. The trust model needs to address the different aspects of trust, between automated systems (M2Mt), between human stakeholders holding responsibilities for different parts of 5G networks, between user and network operators and between users of the network (U2Ut), trust that a human stakeholder has towards a system (U2Mt), that an automated system (machine) has in users that it interacts with.5G-ENSURE project also aims at providing new innovative solutions ensuring the highest level of security and resilience in 5G network. Mobile networks will dramatically evolve with the fifth generation of networks compared to 3/4G, in particular with new concepts and technologies such Internet of Things, infrastructure virtualization (SDN, NFV), network resource sharing, new access interfaces, dynamic network topologies, slicing and so forth. These technologies introduce new security and resilience and provide new opportunities to implement extensive and accurate security solutions. Thus, new innovative approaches to predict and counter these challenges will be considered by the category devoted to Monitoring the 5G security
    corecore