The pursuit of the higher performance mobile communications forces the emergence of the fifth generation mobile communication(5G). 5G network, integrating wireless and wired domain, can be qualified for the complex vi...The pursuit of the higher performance mobile communications forces the emergence of the fifth generation mobile communication(5G). 5G network, integrating wireless and wired domain, can be qualified for the complex virtual network work oriented to the cross-domain requirement. In this paper, we focus on the multi-domain virtual network embedding in a heterogeneous 5G network infrastructure, which facilitates the resource sharing for diverse-function demands from fixed/mobile end users. We proposed the mathematical ILP model for this problem.And based on the layered-substrate-resource auxiliary graph and an effective six-quadrant service-type-judgment method, 5G embedding demands can be classified accurately to match different user access densities. A collection of novel heuristic algorithms of virtual 5G network embedding are proposed. A great deal of numerical simulation results testified that our algorithm performed better in terms of average blocking rate, routing latency and wireless/wired resource utilization, compared with the benchmark.展开更多
This research work aims at modelling a framework for Private Cloud infrastructure Deployment for Information and Communication Technology Centres (ICTs) in tertiary institutions in Nigeria. Recent researches have indi...This research work aims at modelling a framework for Private Cloud infrastructure Deployment for Information and Communication Technology Centres (ICTs) in tertiary institutions in Nigeria. Recent researches have indicated that cloud computing will become the mainstream in computing technology and very effective for businesses. All Tertiary Institutions have ICT units, and are generally charged with the responsibilities of deploying ICT infrastructure and services for administration, teaching, research and learning in higher institution at large. The Structured System Analysis and Design Methodology (SSADM) is used in this research and a six-step framework for a cost effective and scalable Private cloud infrastructure using server virtualization is presented as an alternative that can guarantee total and independent control of data flow in the institutions, while ensuring adequate security of vital information.展开更多
Integrating the theory of distributed virtual geographic environment (DVGE) and high level architecture(HLA), the architecture of DVGE based on HLA is designed. The data flow and the object models of the architecture ...Integrating the theory of distributed virtual geographic environment (DVGE) and high level architecture(HLA), the architecture of DVGE based on HLA is designed. The data flow and the object models of the architecture are also discussed. The architecture basically meets the need of DVGE in real-time communication, distribution, collaboration, reusing and interoperation, expansion, and standard.展开更多
This paper analyzes the state of the art of partner selection and enumerates the advantage of partner selection based on gray relation analysis comparing to the other algorithms of the partner selection. Furthermore, ...This paper analyzes the state of the art of partner selection and enumerates the advantage of partner selection based on gray relation analysis comparing to the other algorithms of the partner selection. Furthermore, partner selection system based on gray relation for an Agile Virtual Enterprise(AVE) is analyzed and designed based on the definition and characteristics of the AVE. According to J2EE mode, the architecture of the partner selection system is put forward and the system is developed t^ing JSP, EJB and SQL Server. The paper lays emphasis on a gray relational mathematic model, AVE evaluation infrastructure, a core algorithm of partner selection and a multi-layer gray relation selection process.展开更多
Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified ne...Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified network lifecycle,and policies management.Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration(NFV MANO),and malicious attacks in different scenarios disrupt the NFV Orchestrator(NFVO)and Virtualized Infrastructure Manager(VIM)lifecycle management related to network services or individual Virtualized Network Function(VNF).This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order to enhance the quality of experience for end users.An anomaly detector investigates these identified risks and provides secure network services.It enables virtual network security functions and identifies anomalies in Kubernetes(a cloud-based platform).For training and testing purpose of the proposed approach,an intrusion-containing dataset is used that hold multiple malicious activities like a Smurf,Neptune,Teardrop,Pod,Land,IPsweep,etc.,categorized as Probing(Prob),Denial of Service(DoS),User to Root(U2R),and Remote to User(R2L)attacks.An anomaly detector is anticipated with the capabilities of a Machine Learning(ML)technique,making use of supervised learning techniques like Logistic Regression(LR),Support Vector Machine(SVM),Random Forest(RF),Naïve Bayes(NB),and Extreme Gradient Boosting(XGBoost).The proposed framework has been evaluated by deploying the identified ML algorithm on a Jupyter notebook in Kubeflow to simulate Kubernetes for validation purposes.RF classifier has shown better outcomes(99.90%accuracy)than other classifiers in detecting anomalies/intrusions in the containerized environment.展开更多
The cloud computing technology is utilized for achieving resource utilization of remotebased virtual computer to facilitate the consumers with rapid and accurate massive data services.It utilizes on-demand resource pr...The cloud computing technology is utilized for achieving resource utilization of remotebased virtual computer to facilitate the consumers with rapid and accurate massive data services.It utilizes on-demand resource provisioning,but the necessitated constraints of rapid turnaround time,minimal execution cost,high rate of resource utilization and limited makespan transforms the Load Balancing(LB)process-based Task Scheduling(TS)problem into an NP-hard optimization issue.In this paper,Hybrid Prairie Dog and Beluga Whale Optimization Algorithm(HPDBWOA)is propounded for precise mapping of tasks to virtual machines with the due objective of addressing the dynamic nature of cloud environment.This capability of HPDBWOA helps in decreasing the SLA violations and Makespan with optimal resource management.It is modelled as a scheduling strategy which utilizes the merits of PDOA and BWOA for attaining reactive decisions making with respect to the process of assigning the tasks to virtual resources by considering their priorities into account.It addresses the problem of pre-convergence with wellbalanced exploration and exploitation to attain necessitated Quality of Service(QoS)for minimizing the waiting time incurred during TS process.It further balanced exploration and exploitation rates for reducing the makespan during the task allocation with complete awareness of VM state.The results of the proposed HPDBWOA confirmed minimized energy utilization of 32.18% and reduced cost of 28.94% better than approaches used for investigation.The statistical investigation of the proposed HPDBWOA conducted using ANOVA confirmed its efficacy over the benchmarked systems in terms of throughput,system,and response time.展开更多
Power control for virtualized enviromnents has is keeping underlying infrastructure in reasonably low power gained much attention recently. One of the major challenges states and achieving service-level objectives (S...Power control for virtualized enviromnents has is keeping underlying infrastructure in reasonably low power gained much attention recently. One of the major challenges states and achieving service-level objectives (SLOs) of upper applications as well. Existing solutions, however, cannot effectively tackle this problem for virtualized environments. In this paper, we propose an automated power control solution for such scenarios in hope of making some progress. The major advantage of our solution is being able to precisely control the CPU frequency levels of a physical environment and the CPU power allocations among virtual machines with respect to the SLOs of multiple applications. Based on control theory and online model estimation, our solution can adapt to the variations of application power demands. Additionally, our solution can simultaneously manage the CPU power control for all virtual machines according to their dependencies at either the application-level or the infrastructure-level. The experimental evaluation demonstrates that our solution outperforms three state-of-the-art methods in terms of achieving the application SLOs with low infrastructure power consumption.展开更多
云计算为能够为用户提供基础作为服务(IaaS,Infrastructure as a Service)的计算能力,使得用户能够在使用高效、可靠、经济的计算资源的同时,不用增加额外的购置、维护资源的开销,这在很大程度上要依赖对虚拟资源的使用。因此如何有效...云计算为能够为用户提供基础作为服务(IaaS,Infrastructure as a Service)的计算能力,使得用户能够在使用高效、可靠、经济的计算资源的同时,不用增加额外的购置、维护资源的开销,这在很大程度上要依赖对虚拟资源的使用。因此如何有效地管理虚拟资源,使其使用率最大化并保证用户对资源使用的有效性,已成了眼下的攻关难题。针对这一问题,文章提出了一种面向虚拟资源的云计算资源管理机制,通过对虚拟资源的划分、预留及调度策略,为用户提供有效的IaaS服务。通过仿真实验结果表明,该方法能够提高虚拟资源的使用率及保证用户对资源使用的有效性。展开更多
基金supported in part by Open Foundation of State Key Laboratory of Information Photonics and Optical Communications (Grant No. IPOC2014B009)Fundamental Research Funds for the Central Universities (Grant Nos. N130817002, N150401002)+1 种基金Foundation of the Education Department of Liaoning Province (Grant No. L2014089)National Natural Science Foundation of China (Grant Nos. 61302070, 61401082, 61471109, 61502075, 91438110)
文摘The pursuit of the higher performance mobile communications forces the emergence of the fifth generation mobile communication(5G). 5G network, integrating wireless and wired domain, can be qualified for the complex virtual network work oriented to the cross-domain requirement. In this paper, we focus on the multi-domain virtual network embedding in a heterogeneous 5G network infrastructure, which facilitates the resource sharing for diverse-function demands from fixed/mobile end users. We proposed the mathematical ILP model for this problem.And based on the layered-substrate-resource auxiliary graph and an effective six-quadrant service-type-judgment method, 5G embedding demands can be classified accurately to match different user access densities. A collection of novel heuristic algorithms of virtual 5G network embedding are proposed. A great deal of numerical simulation results testified that our algorithm performed better in terms of average blocking rate, routing latency and wireless/wired resource utilization, compared with the benchmark.
文摘This research work aims at modelling a framework for Private Cloud infrastructure Deployment for Information and Communication Technology Centres (ICTs) in tertiary institutions in Nigeria. Recent researches have indicated that cloud computing will become the mainstream in computing technology and very effective for businesses. All Tertiary Institutions have ICT units, and are generally charged with the responsibilities of deploying ICT infrastructure and services for administration, teaching, research and learning in higher institution at large. The Structured System Analysis and Design Methodology (SSADM) is used in this research and a six-step framework for a cost effective and scalable Private cloud infrastructure using server virtualization is presented as an alternative that can guarantee total and independent control of data flow in the institutions, while ensuring adequate security of vital information.
基金Funded by the National Natural Science Foundation of China (No.40341011) and the National 863 Program of China(No.2002AA135230)
文摘Integrating the theory of distributed virtual geographic environment (DVGE) and high level architecture(HLA), the architecture of DVGE based on HLA is designed. The data flow and the object models of the architecture are also discussed. The architecture basically meets the need of DVGE in real-time communication, distribution, collaboration, reusing and interoperation, expansion, and standard.
文摘This paper analyzes the state of the art of partner selection and enumerates the advantage of partner selection based on gray relation analysis comparing to the other algorithms of the partner selection. Furthermore, partner selection system based on gray relation for an Agile Virtual Enterprise(AVE) is analyzed and designed based on the definition and characteristics of the AVE. According to J2EE mode, the architecture of the partner selection system is put forward and the system is developed t^ing JSP, EJB and SQL Server. The paper lays emphasis on a gray relational mathematic model, AVE evaluation infrastructure, a core algorithm of partner selection and a multi-layer gray relation selection process.
基金This work was funded by the Deanship of Scientific Research at Jouf University under Grant Number(DSR2022-RG-0102).
文摘Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified network lifecycle,and policies management.Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration(NFV MANO),and malicious attacks in different scenarios disrupt the NFV Orchestrator(NFVO)and Virtualized Infrastructure Manager(VIM)lifecycle management related to network services or individual Virtualized Network Function(VNF).This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order to enhance the quality of experience for end users.An anomaly detector investigates these identified risks and provides secure network services.It enables virtual network security functions and identifies anomalies in Kubernetes(a cloud-based platform).For training and testing purpose of the proposed approach,an intrusion-containing dataset is used that hold multiple malicious activities like a Smurf,Neptune,Teardrop,Pod,Land,IPsweep,etc.,categorized as Probing(Prob),Denial of Service(DoS),User to Root(U2R),and Remote to User(R2L)attacks.An anomaly detector is anticipated with the capabilities of a Machine Learning(ML)technique,making use of supervised learning techniques like Logistic Regression(LR),Support Vector Machine(SVM),Random Forest(RF),Naïve Bayes(NB),and Extreme Gradient Boosting(XGBoost).The proposed framework has been evaluated by deploying the identified ML algorithm on a Jupyter notebook in Kubeflow to simulate Kubernetes for validation purposes.RF classifier has shown better outcomes(99.90%accuracy)than other classifiers in detecting anomalies/intrusions in the containerized environment.
文摘The cloud computing technology is utilized for achieving resource utilization of remotebased virtual computer to facilitate the consumers with rapid and accurate massive data services.It utilizes on-demand resource provisioning,but the necessitated constraints of rapid turnaround time,minimal execution cost,high rate of resource utilization and limited makespan transforms the Load Balancing(LB)process-based Task Scheduling(TS)problem into an NP-hard optimization issue.In this paper,Hybrid Prairie Dog and Beluga Whale Optimization Algorithm(HPDBWOA)is propounded for precise mapping of tasks to virtual machines with the due objective of addressing the dynamic nature of cloud environment.This capability of HPDBWOA helps in decreasing the SLA violations and Makespan with optimal resource management.It is modelled as a scheduling strategy which utilizes the merits of PDOA and BWOA for attaining reactive decisions making with respect to the process of assigning the tasks to virtual resources by considering their priorities into account.It addresses the problem of pre-convergence with wellbalanced exploration and exploitation to attain necessitated Quality of Service(QoS)for minimizing the waiting time incurred during TS process.It further balanced exploration and exploitation rates for reducing the makespan during the task allocation with complete awareness of VM state.The results of the proposed HPDBWOA confirmed minimized energy utilization of 32.18% and reduced cost of 28.94% better than approaches used for investigation.The statistical investigation of the proposed HPDBWOA conducted using ANOVA confirmed its efficacy over the benchmarked systems in terms of throughput,system,and response time.
基金supported by the National Key Technology Research and Development Program of the Ministry of Science and Technology of China under Grant No.2012BAH46B03the National HeGaoJi Key Project under Grant No.2013ZX01039-002-001-001the Strategic Priority Research Program of the Chinese Academy of Sciences under Grant No.XDA06030200
文摘Power control for virtualized enviromnents has is keeping underlying infrastructure in reasonably low power gained much attention recently. One of the major challenges states and achieving service-level objectives (SLOs) of upper applications as well. Existing solutions, however, cannot effectively tackle this problem for virtualized environments. In this paper, we propose an automated power control solution for such scenarios in hope of making some progress. The major advantage of our solution is being able to precisely control the CPU frequency levels of a physical environment and the CPU power allocations among virtual machines with respect to the SLOs of multiple applications. Based on control theory and online model estimation, our solution can adapt to the variations of application power demands. Additionally, our solution can simultaneously manage the CPU power control for all virtual machines according to their dependencies at either the application-level or the infrastructure-level. The experimental evaluation demonstrates that our solution outperforms three state-of-the-art methods in terms of achieving the application SLOs with low infrastructure power consumption.
文摘云计算为能够为用户提供基础作为服务(IaaS,Infrastructure as a Service)的计算能力,使得用户能够在使用高效、可靠、经济的计算资源的同时,不用增加额外的购置、维护资源的开销,这在很大程度上要依赖对虚拟资源的使用。因此如何有效地管理虚拟资源,使其使用率最大化并保证用户对资源使用的有效性,已成了眼下的攻关难题。针对这一问题,文章提出了一种面向虚拟资源的云计算资源管理机制,通过对虚拟资源的划分、预留及调度策略,为用户提供有效的IaaS服务。通过仿真实验结果表明,该方法能够提高虚拟资源的使用率及保证用户对资源使用的有效性。