The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This demo showcases some of the capabilities foreseen for the security infrastructure designed by the H2020 SHIELD project. SHIELD exploits NFV for adaptive monitoring of an IT infrastructure and for feeding the data to an analytics engine to detect attacks in real time. An intelligent reaction system is then activated to reconfigure the SDN/NFV infrastructure so that the attacks are thwarted. The...
Recent proposals enhances Wireless Sensor Networks (WSNs) with Software Defined Networking (SDN) practices, introducing new innovative network control strategies and protocols based on a central control logic, i.e., enabling WSNs as crucial facilities for the Internet of Things (IoT). In this direction, we demonstrate CORAL-SDN, an SDN solution for WSNs which: (i) uses intelligent centralized control...
Software Defined Networking (SDN) presents a unique opportunity to manage and orchestrate cloud networks. The educational institutions, like many other industries face a lot of security threats. We have established an SDN enabled Demilitarized Zone (DMZ) — Science DMZ to serve as testbed for securing ASU Internet2 environment. Science DMZ allows researchers to conduct in-depth analysis of security...
This demo presents an end-to-end hierarchical control of a multi-domain multi-technology integrated fronthaul and backhaul network where a parent controller coordinates the operation of a wireless and optical child controllers managing real wireless and optical data plane resources. The services offered by this hierarchical control infrastructure are accessed through the offered REST-based northbound...
In recent times, mobile broadband networks are focused on bringing different capabilities to the edge of the mobile network. Mobile Edge Computing (MEC) addresses this issue by placing the compute and storage resources closer to the Radio Access Network (RAN), with an aim to reduce end-to-end latency, ensure better service delivery, and offer improved user experience. In this work, we propose SDEC...
Ongoing evolutions in the Network Function Virtualization (NFV) area show that software will play an increasingly important role within the telecommunication industry. It enables telco providers to faster introduce telecom services, combined with new possibilities to optimize and fine-tune operational performance. New virtualization and softwarization methods support fine-grained scaling of resources...
The emergence of 5G wireless and IoT (Internet of Things) technologies, as well as the continuous evolution of cloud computing is driving the need for easy and on-demand creation of end-to-end network services. We have developed an integrated system called the end-to-end network service orchestrator, which realizes seamless service orchestration across multiple on-premises and cloud infrastructures...
MEC or Multi-Access Edge Computing is a network service delivery architecture that enables cloud computing capabilities at the edge of the access network. Realisation of the MEC vision is challenging with current network technologies: service discovery and routing, secure network slicing and distributed mobility management require complex capabilities in the network. This demo features an OMEC use...
Testing large complex distributed applications in cloud environments is a complex task. Developing tests to assess these kind of applications is time-consuming, and requires adapting and integrating many different tools for different purposes. The main objective of this demonstration is two-folded. First, it introduces ElasTest, a flexible open source testing platform aimed at simplifying end-to-end...
Since the demand for more bandwidth, agile infrastructures and services grows, it becomes challenging for Service Providers like GEANT to manage the proprietary underlay, while keeping costs low. In such a scenario, Software Defined Networking (SDN), open hardware and open source software prove to be key components to address those challenges. After one year of development, SDX-L2 and BoD, the SDN-ization...
The goal of the 5G Exchange project is to enable cross-domain orchestration of services over multiple administrations. The system we build allows the end-to-end integration of heterogeneous resource and service elements of a multi-vendor technology environment from multiple operators by sharing their network and compute infrastructures via NFV orchestration. We will run an industry control 5G use-case,...
We present a testbed implementation for the development, evaluation and demonstration of security orchestration in a network function virtualization environment. As a specific scenario, we demonstrate how an intelligent response to DDoS and various other kinds of targeted attacks can be formulated such that these attacks and future variations can be mitigated. We utilise machine learning to characterise...
In this paper, we study how to provide optimal performance guarantee in multi-resource scenarios, such as Network Function Virtualization (NFV), where Virtual Network Function (VNF) resource demands of one Service Function Chain (SFC) are elastic and correlated with the end-to-end throughput of SFC. Previous works such as Dominant Resource Fairness (DRF) achieve this goal only if the demands are already...
Network Function Virtualization (NFV) enables network operators to utilize a common substrate network for offering different networking services flexibly and dynamically in the form of service chains. A service chain in NFV consists of a set of Virtualized Network Functions (VNFs) that are interconnected through a network to form a logical service. VNFs in a service chain are usually implemented on...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.