The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Abstraction and Control of Traffic Engineered Networks (ACTN) defines the requirements, use cases, and an SDN-based architecture, relying on the concepts of network and service abstraction, detaching the network and service control from the underlying data plane. The architecture encompasses Physical Network Controllers (PNCs), responsible for specific technology and administrative domains, orchestrated...
Nowadays, Edge computing allows to push the application intelligence at the boundaries of a network in order to get high-performance processing closer to both data sources and end-users. In this scenario, the Horizon 2020 BEACON project - enabling federated Cloud-networking - can be used to setup Fog computing environments were applications can be deployed in order to instantiate Edge computing applications...
In this paper, we propose a three-stage reconfigurable topology synthesis approach for Application-Specific NoC (ASNoC) on partially dynamically reconfigurable FPGAs, where the topology is reconfigured dynamically at run-time along with the application’s execution. Firstly, given the scheduling and floorplanning of task modules, an Integral Linear Programming (ILP)-based method is proposed to partition...
Network operators must deal with multi-layer architectures in their production networks. Not so much time ago, network operators were delivering the IP traffic using ATM. ATM protocol was used to aggregate end-user traffic coming from DSL connections. This traffic was transported Synchronous Digital Hierarchy (SDH) as the standard transport technology for fiber-optic transmission systems in backbone...
The recent deployment of novel network concepts, such as M2M communication or IoT, has undoubtedly stimulated the placement of a new set of services, leveraging both centralized resources in Cloud Data Centers and distributed resources shared by devices at the edge of the network. Moreover, Fog Computing has been recently proposed having as one of its main assets the reduction of service response...
Orchestrating a service or resources across multiple administrative domains requires three main high level steps of operation: i) capability detection of other domains ii) placement of the service request across the domains iii) assurance that the service is functioning within the acceptable bounds of the service level agreement (SLA). This paper focuses on the assurance step; in particular, we present...
Future 5G networks will rely on the coordinated allocation of compute, storage, and networking resources in order to meet the functional requirements of 5G services as well as guaranteeing efficient usage of the network infrastructure. However, the 5G service provisioning paradigm will also require a unified infrastructure service market that integrates multiple operators and technologies. The 5G...
A novel pixel architecture for CMOS image sensors is presented. It uses only one amplifier for both integration of the photocurrent and in-pixel noise cancelation, thus minimizing power consumption. The circuit is specifically designed to be used in readout systems for lateral flow immunoassays. In addition a switching technique is introduced enabling the use of column correlated double sampling technique...
We propose an architecture that increases the resiliency against DDoS attacks by leveraging virtual network functions (VNF) and software defined networking (SDN). In the first step, the proposed architecture places the virtual network functions (VNF) optimally by solving a linear program. In the second step, in order to add preemptive protection against DDoS attacks, special filter VNFs and secondary...
In this paper, we propose a novel data center network architecture named FFTree. Compared to widely adopted industrial solutions including fat-tree, this architecture can provide even higher aggregate bandwidth and richer path availability. Most importantly, FFTree provisions unique flexibility so that its topology and performance can be tailored with great freedom before its deployment. The fine...
Spectrally-efficient operation with high power and high efficiency at deep back-off will be critical for the next-generation mm-Wave transmitters for 5G and beyond. In addition, as larger non-contiguous chunks of the mm-Wave spectrum open up, dynamic frequency reconfiguration while ensuring high spectral and energy efficiency can become key towards optimal utilization of spectral resources. In this...
The explosion of traffic demands within data centers accentuates the conventional infrastructures ossification. Unfortunately, the traditional tree based architectures struggle to resist and suffer from congestion and wiring complexity which deeply deteriorate the network performance. In aim to address the QoS degradation, we put forward a Hybrid Data Center Network (HDCN) architecture based on CISCO's...
Metropolitan areas witness significant fluctuations in mobile traffic due to patterns of human mobility. This fluctuation drastically deteriorates the efficiency and financial viability of conventional maximum-based network design. If networks are deployed to deal with the peak traffic rate at each site, their capacities are underutilized for most of time. To improve the efficiency of deploying base...
In this contribution an image classification by uncoupled Cellular Nonlinear Networks (CNN) is proposed and evaluated on typical datasets, like CIFAR-10 and MNIST. The algorithm is based on the application of backpropagation for the training of synaptic coupling weights and is capable of binary classification by means of a threshold-based classifier. The design is inspired by recent deep neural network...
Thorough investigation of the Cloud-RAN (C-RAN) architecture has recently shown that C-RAN can bring advanced cooperated and coordinated processing capabilities as well as the multiplexing gains toward future radio access networks. The baseband processing of each base station instance can now be flexibly split into smaller functional components, that can be placed either at remote radio units (RRUs)...
Leveraging Software-Defined Networking (SDN) and middleboxes, application-level policies can be propagated to the network. SMART is an SDN middlebox architecture that differentiates network flows based on tenant inputs. By leveraging FlowTags software middlebox in addition to the OpenFlow rules, it supports a larger scope of tenant preferences and rules from the application layer to alter the network...
In this paper we proposed policy based security architecture for securing the communication in multiple Autonomous System (AS) domains with Software Defined Networks (SDN). We will present a high level overview of the architecture and detail discussion on some of the important components for securing the communication in multiple AS domains. A key component of the security architecture is the specification...
In this paper, we present an architecture and implementation for self-managing cloud application using overlay networks and software defined networking (SDN). Through real world experiments on Amazon EC2 and Smart Applications on Virtual Infrastructure (SAVI) cloud, we demonstrate how our management mechanism autonomously maintains SLAs of application scenarios without provisioning extra resources.
Bit Indexed Explicit Replication (BIER) is a novel multicast forwarding scheme for IP networks that avoids states in replicating routers by encoding the multicast information into a bit string in the packet header. In addition, the BIER-TE variant encodes the multicast tree in the header and allows for network programmability. We propose the use of maximally redundant trees (MRTs) for 1+1 protection...
Cloud computing is becoming a relatively mature paradigm in the ICT landscape. In light of the growing appetite for resources and service levels on par with user expectations, multi-cloud scenarios are becoming the next frontier in the usage of distributed datacenters for private and hybrid Cloud scenarios. Application deployment in particular is a noteworthy feature to be evaluated as microservices...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.