The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The backhaul of upcoming dense 5G Small Cell (SC) networks needs a full redesign, but there is no clear consensus on how to deploy such infrastructure. A low-cost backhaul solution is that provided by a wireless mesh network. Additionally, Software Defined Networking (SDN) is being considered as an alternative to distributed approaches to lower network infrastructure costs while enabling programmability...
Due to special requirements avionic networking devices are typically quite expensive. One way to reduce costs is to make use of commercial off the shelf devices and configure them in a way that gives similar performance. In this paper we evaluate the use of OpenFlow in the avionics environment in terms of performance and configuration. The main feature of OpenFlow is fine-grained access to the switch's...
In network management, when it comes to security breaches, human error constitutes a dominant factor. We present our tool topoS which automatically synthesizes low-level network configurations from high-level security goals. The automation and a feedback loop help to prevent human errors. Except for a last serialization step, topoS is formally verified with Isabelle/HOL, which prevents implementation...
This paper proposes an architecture for implementing DMTF management Profiles in middleware layer of a management console, using microservices. Microservices is a software architecture style, gaining popularity for developing Internet scale applications. This paper will also provide a comparison with the current prevalent method of design. This paper will also discuss how this microservice can be...
The European Telecommunications Standards Institute (ETSI) has published a Group Specification document outlining Network Function Virtualization Management and Orchestration (NFV-MANO) systems, advocating an open environment for the purpose of integrating multiple vendor solutions into one NFV ecosystem. To align with this initiative, there is a need to transform the specification into real products...
Service Function Chaining (SFC) supports services/applications through linking an ordered list of service functions (such as firewalls, deep packet inspections and load balancers) in the network. Using Software Defined Networking (SDN) and Network Function Virtualization (NFV) provides a simpler and shorter SFC process. In order to provide high-availability on a multi-site SFC, it is required a flexible...
Mobile applications such as VoIP, (live) gaming, or video streaming have diverse QoS requirements ranging from low delay to high throughput. The optimization of the network quality experienced by end-users requires detailed knowledge of the expected network performance. Also, the achieved service quality is affected by a number of factors, including network operator and available technologies. However,...
Monitoring the massive volume of data streaming from managed nodes in Telecommunication networks reacting in a timely manner is increasingly critical for modern Telecommunications Operations Support Systems (OSS). Given the large number and the varieties of the nodes in a telecoms network, the streaming monitoring data is naturally diverse and the volume is often at scales of multiple millions data...
Network managers have to deal with tons of measurement data provided by monitoring systems. Such data is difficult to both process and translate into concrete management actions. As an attempt to make managerial work easier, we propose a novel statistical approach that summarizes the behavior of network flow characteristics — e.g., flow sizes or durations. Bearing in mind that losses in the summarized...
Network Function Virtualization (NFV) is emerging as one of the most innovative concepts in the networking landscape. By migrating network functions from dedicated mid-dleboxes to general purpose computing platforms, NFV can effectively reduce the cost to deploy and to operate large networks. However, in order to achieve its full potential, NFV needs to encompass also the radio access network allowing...
With the promise of providing flexible and elastic computing resources on demand, the cloud computing has been attracting enterprises and individuals to migrate workloads in the legacy environment to the public/private/hybrid clouds. Also, cloud customers want to migrate between cloud providers with different requirements such as cost, performance, and manageability. However the workload migration...
We present an algorithm to certify IP spoofing protection of firewall rulesets. The algorithm is machine-verifiably proven sound and its use is demonstrated in real-world scenarios.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.