13 research outputs found

    “Torstein Bae nĂ„ spiller sitt adverbial Ă©n frem”: – en analyse av karakteristiske trekk i talesprĂ„ket til NRKs sjakkekspert og -kommentator

    Get PDF
    Artikkelen presenterer en analyse av karakteristiske trekk i talesprĂ„ket til NRKs sjakkekspert og -kommentator Torstein Bae. Materialet er offentlig tilgjengelig pĂ„ NRKTV, og de aktuelle eksemplene er trukket fra alle de 15 partiene i hurtigsjakk-VM 2019. De karakteristiske trekkene er kategorisert i fire variabler: plassering av adverbial pĂ„ a i midtfeltet, plassering av adverbial fĂžr finitt verbal (brudd pĂ„ V2-regelen), forklarende innskutte ledd (ofte i ekstraposisjon) og refleksive possessive determinativer. Eksemplene drĂžftes opp mot prinsipper som leddrekkefĂžlgen i norsk bestemmes av; informasjonsstruktur, syntaktisk funksjon og vektprinsippet. Videre drĂžftes bruk av vektprinsippet opp mot relevansteorien til Sperber og Wilson (1986/1995) som kan plasseres innen nyere kognitiv pragmatikk.“Torstein Bae nĂ„ spiller sitt adverbial Ă©n frem”: – en analyse av karakteristiske trekk i talesprĂ„ket til NRKs sjakkekspert og -kommentatorpublishedVersio

    Lars S. VikĂžr: Nynorske nedslag. Ei artikkelsamling. 2018.

    Get PDF
    Lars VikĂžrs seinaste bok har namnet Nynorske nedslag. Ei artikkelsamling og er gjeven ut i 2018. Boka er ei samling pĂ„ heile 22 artiklar innan nord-isk sprĂ„kvitskap. Som VikĂžr sjĂžlv seier i fĂžreordet, inneheld boka ‘over-skytande’ artiklar som ikkje blei med i festskriftet SprĂ„k og samfunn – heime og ute. Festskrift til Lars S. VikĂžr 65 Ă„r, som ĂČg inneheld jubilanten sine eigne artiklar og er gjeven ut pĂ„ Novus forlag i 2011. Ein kan slik kanskje fĂ„ eit inntrykk av at det ikkje er forfattaren sine fĂžretrekte ar-tiklar vi mĂžter i Nynorske nedslag, og at han snakkar boka si litt ned inn-leiingsvis. DĂ©t er det ingen grunn til, for boka spenner vidt og inneheld noko for alle som er opptekne av norsk sprĂ„k og sprĂ„k generelt. Artiklane har nyttige ingressar som seier kor dei fĂžrst vart publiserte, og kva end-ringar som eventuelt er gjort. Eit par artiklar er nyskrivne for denne boka. Tekstutvalet er avgrensa til nordistikken, og alle artiklane er norsksprĂ„k-lege og pĂ„ nynorsk. I tillegg er dei fleste plasserte innanfor emneomrĂ„det ‘nynorsk framvokster i vĂ„r tid’. Dette er ifĂžlgje forfattaren ĂČg grunnen for valet av tittel pĂ„ boka, som elles ĂČg kunne konnotere andre emne-omrĂ„de innan nordistikken. Eg vil her gjere ei inndeling av artiklane etter kva overordna felt innan sprĂ„kvitskapen dei handlar om, og sĂ„ gje eit riss av innhaldet i ein del av artiklane slik at lesaren kan danne seg eit heilskapleg inntrykk av boka og fĂ„ litt hjelp til Ă„ velje ut dei artiklane som kan vere av interesse

    Evaluation of IP over Bluetooth

    Get PDF
    The increasing use of Wireless technologies suggest that this kind of technology has a bright future. Today the most popular Wireless Local Area Networks are WLAN 802.11 and Bluetooth. They both have their strengths in different environments. Bluetooth was not initially an Internet technology, but over the years the focus on implementing Bluetooth nodes with Internet capability has increased. When we want to run IP over Bluetooth we need some kind of gateway to the Internet from Bluetooth, a network access point. This will be an important device in the thesis. The Bluetooth Special Interest Group has suggested two ways to implement IP over Bluetooth in different scenarios, but there is still a lot more work to do. This thesis will deal with some of these approaches. Hence, we will discuss problems like: the Bluetooth protocol stack, scalability, efficiency and mobility, which are the factors considered important to Bluetooth and IP. The thesis will give an evaluation of these different issues and in the end we will give a short outline of how we suggest making a larger Bluetooth network which runs over IP. The Stack – There has been several suggestions about how to implement IP over Bluetooth. We have taken a look at four different designs of the Bluetooth stack and evaluate all of them. There are mainly two designs that are relatively good and can both be used. We will give preference to these two methods and their strengths and weaknesses. Scalable – The number of Bluetooth devices within one single Bluetooth-network is currently quite limited (piconets). But according to the Bluetooth specification we can interconnect several networks (scatternets). It has not yet specified how to realize IP over Bluetooth, but there is work going on. If we had a network like this, the network will become more complex and slow, and maybe that’s the reason this is not specified. We will evaluate why this is so and suggest ways to make larger Bluetooth networks more efficient. Efficient – At the moment Bluetooth networks are relatively slow. The Bluetooth network is not made for high bit rate transmissions, but still there is some need for a certain bandwidth. By making a good designed protocol stack and a good network structure, we will try to make Bluetooth as efficient as possible. Mobility – As a part of every wireless technology, we always set some requirements for roaming and mobility. We want Bluetooth devices to roam and connect to the nearest Internet access point. Issues we will need to discuss concerning this topics are methods to realize a well designed network that covers the needs of Bluetooth roaming. Some methods we will discuss are Mobile IP, handover/handoff etc. In this context routing and forwarding is also important matters. In the end we will also show our own solution to solve mobility problems

    Cyber security awareness and culture in rural Norway

    No full text
    Understanding the level of security awareness, the perception, and the culture of users in aspects related to security, is crucial for the development of suitable measures towards their protection and the protection of the utilized infrastructure. This becomes imperative in countries with increased penetration of Information and Communication Technologies (ICT), such as Norway. In this paper, we present the results of a study conducted by NTNU and Eidsiva bredbÄnd AS, in respect to the security awareness and cyber security culture of Norwegian users of ICT. The study aims to investigate the level of security awareness of Norwegian Internet subscription owners and identify how and if their security awareness can be improved. For that reason, we aim to identify the demographic groups and the characteristics of the security awareness of the Internet users. These attributes have been used to identify the need for knowledge and the cyber security training preferences among different groups of internet users. We have discovered that the level of security awareness is highly subjective and that training programs provided by Internet Service Providers are recommendable

    Security in Interconnected Network Function Virtualisation Environments

    No full text
    Network Functions Virtualization (NFV) aims to change how network operators handle their network equipment. It also aims to change how end-users shop their network service. NFV is a paradigm shift of networking which consists of moving the physical network appliances from hardware to software. This enables providers to run these network devices in remote data centres. One example of this concept is that end-users do no longer need to have a stack of residential network equipment. They can simply move their network devices to the cloud. This concept of virtualizing network equipment has the potential to significantly reduce hardware cost, decrease the time-to-market, expand the lifetime of the network devices and save operational expenses. However, security remains a major concern for operators and end-users before they are willing to adopt the technology more widely. The border security arranged by physical network devices becomes more unclear for the end-users, and they can easily question who has access to their virtual network devices. The concept of virtualisation also enables the virtual network devices to be run at any service provider. Then, this also questions what provider who has access to what data. If all network traffic from the end-users are going through multiple services at multiple providers, then the end-user can question, who has access to what and who can access their data traffic? In fact, the end-users have very little control over this. However, it is obvious that the privacy of the end-users is important. They should be able to know what provider who can access their data traffic, who can access what and whether they share an NFV network service with someone else. They should also be able to know if their homes are protected from cyber-attacks. Correspondingly, the main objective of this research is to provide a mechanism which ensures the confidentiality, integrity and availability of the end-users’ NFV traffic. In particular, it aims to secure end-user communication when Internet Service Providers are sharing virtual network service platforms between each other. This includes protecting the integrity of the data traffic and achieving data traffic confidentiality, which currently is very limited in NFV environments. The first part of the research contains a study of the security implications of putting a virtual networking device into the cloud. This research aims to put a focus on the aforementioned research challenge and investigate what security mechanisms which can be used to achieve integrity and confidentiality. This research challenges the current standards and asks whom the end-user can trust in a multi-provider NFV environment. Further, this research results in a set of requirements which must be fulfilled in order to achieve the security objectives. These security concerns present a major obstacle for NFV adoption. Hence, the second part of the research presents an architecture of how to overcome these security challenges. The focus in these studies concerns how the access control can be achieved by low-level packet isolation and how it can be abstracted to network orchestration policies. The key elements in this research challenge are how to exchange keys and how to steer encrypted data packets. The last part of the research is related to the development of a framework which supports the confidentiality, integrity and the availability of the data traffic in NFV. Here, this research aimed to verify that the implementation of the architecture fulfils the requirements which were developed in the first part of this research. The final results show that these requirements are fulfilled. In the context of NFV adoption, this research contribution of access control and confidentiality can affect the perspective of security and trust in NFV networks for both end-users and operators. Correspondingly, it can also have an impact on NFV adoption in general

    A Tiered Control Plane Model for Service Function Chaining Isolation

    No full text
    This article presents an architecture for encryption automation in interconnected Network Function Virtualization (NFV) domains. Current NFV implementations are designed for deployment within trusted domains, where overlay networks with static trusted links are utilized for enabling network security. Nevertheless, within a Service Function Chain (SFC), Virtual Network Function (VNF) flows cannot be isolated and end-to-end encrypted because each VNF requires direct access to the overall SFC data-flow. This restricts both end-users and Service Providers from enabling end-to-end security, and in extended VNF isolation within the SFC data traffic. Encrypting data flows on a per-flow basis results in an extensive amount of secure tunnels, which cannot scale efficiently in manual configurations. Additionally, creating secure data plane tunnels between NFV providers requires secure exchange of key parameters, and the establishment of an east–west control plane protocol. In this article, we present an architecture focusing on these two problems, investigating how overlay networks can be created, isolated, and secured dynamically. Accordingly, we propose an architecture for automated establishment of encrypted tunnels in NFV, which introduces a novel, tiered east–west communication channel between network controllers in a multi-domain environment

    A Proof-of-Concept Demonstration of Isolated and Encrypted Service Function Chains

    No full text
    ontemporary Service Function Chaining (SFC), and the requirements arising from privacy concerns, call for the increasing integration of security features such as encryption and isolation across Network Function Virtualisation (NFV) domains. Therefore, suitable adaptations of automation and encryption concepts for the development of interconnected data centre infrastructures are essential. Nevertheless, packet isolation constraints related to the current NFV infrastructure and SFC protocols, render current NFV standards insecure. Accordingly, the goal of our work was an experimental demonstration of a new SFC packet forwarding standard that enables contemporary data centres to overcome these constraints. This article presents a comprehensive view of the developed architecture, focusing on the elements that constitute a new forwarding standard of encrypted SFC packets. Through a Proof-of-Concept demonstration, we present our closing experimental results of how the architecture fulfils the requirements defined in our use case

    Dynamic setup of IPsec VPNs in service function chaining

    No full text
    This article describes a novel mechanism for the automated establishment of dynamic Virtual Private Networks (VPN) in the application domain of Network Function Virtualization (NFV). Each hop in an NFV Service Function Chain (SFC) lacks the capability of per-flow encryption, that makes the traffic flow in federated NFV environments vulnerable for eavesdropping. Due to the possible lack of bidirectional data plane communication channels between VNFs in an SFC, the Internet Security Key Exchange protocol (IPsec-IKE) is not applicable inside a VNF. Hence, this article introduces an alternative to IPsec-IKE that is specifically designed for NFV environments. This component is named Software Defined Security Associations (SD-SA), which is shown through a proof of concept evaluation to perform better than IPsec-IKE with respect to bandwidth and resource consumption

    A Proof-of-Concept Demonstration of Isolated and Encrypted Service Function Chains

    No full text
    Contemporary Service Function Chaining (SFC), and the requirements arising from privacy concerns, call for the increasing integration of security features such as encryption and isolation across Network Function Virtualisation (NFV) domains. Therefore, suitable adaptations of automation and encryption concepts for the development of interconnected data centre infrastructures are essential. Nevertheless, packet isolation constraints related to the current NFV infrastructure and SFC protocols, render current NFV standards insecure. Accordingly, the goal of our work was an experimental demonstration of a new SFC packet forwarding standard that enables contemporary data centres to overcome these constraints. This article presents a comprehensive view of the developed architecture, focusing on the elements that constitute a new forwarding standard of encrypted SFC packets. Through a Proof-of-Concept demonstration, we present our closing experimental results of how the architecture fulfils the requirements defined in our use case

    A Tiered Control Plane Model for Service Function Chaining Isolation

    No full text
    This article presents an architecture for encryption automation in interconnected Network Function Virtualization (NFV) domains. Current NFV implementations are designed for deployment within trusted domains, where overlay networks with static trusted links are utilized for enabling network security. Nevertheless, within a Service Function Chain (SFC), Virtual Network Function (VNF) flows cannot be isolated and end-to-end encrypted because each VNF requires direct access to the overall SFC data-flow. This restricts both end-users and Service Providers from enabling end-to-end security, and in extended VNF isolation within the SFC data traffic. Encrypting data flows on a per-flow basis results in an extensive amount of secure tunnels, which cannot scale efficiently in manual configurations. Additionally, creating secure data plane tunnels between NFV providers requires secure exchange of key parameters, and the establishment of an east–west control plane protocol. In this article, we present an architecture focusing on these two problems, investigating how overlay networks can be created, isolated, and secured dynamically. Accordingly, we propose an architecture for automated establishment of encrypted tunnels in NFV, which introduces a novel, tiered east–west communication channel between network controllers in a multi-domain environment
    corecore