期刊文献+
共找到79篇文章
< 1 2 4 >
每页显示 20 50 100
Security Monitoring and Management for the Network Services in the Orchestration of SDN-NFV Environment Using Machine Learning Techniques
1
作者 Nasser Alshammari Shumaila Shahzadi +7 位作者 Saad Awadh Alanazi Shahid Naseem Muhammad Anwar Madallah Alruwaili Muhammad Rizwan Abid Omar Alruwaili Ahmed Alsayat Fahad Ahmad 《Computer Systems Science & Engineering》 2024年第2期363-394,共32页
Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified ne... Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified network lifecycle,and policies management.Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration(NFV MANO),and malicious attacks in different scenarios disrupt the NFV Orchestrator(NFVO)and Virtualized Infrastructure Manager(VIM)lifecycle management related to network services or individual Virtualized Network Function(VNF).This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order to enhance the quality of experience for end users.An anomaly detector investigates these identified risks and provides secure network services.It enables virtual network security functions and identifies anomalies in Kubernetes(a cloud-based platform).For training and testing purpose of the proposed approach,an intrusion-containing dataset is used that hold multiple malicious activities like a Smurf,Neptune,Teardrop,Pod,Land,IPsweep,etc.,categorized as Probing(Prob),Denial of Service(DoS),User to Root(U2R),and Remote to User(R2L)attacks.An anomaly detector is anticipated with the capabilities of a Machine Learning(ML)technique,making use of supervised learning techniques like Logistic Regression(LR),Support Vector Machine(SVM),Random Forest(RF),Naïve Bayes(NB),and Extreme Gradient Boosting(XGBoost).The proposed framework has been evaluated by deploying the identified ML algorithm on a Jupyter notebook in Kubeflow to simulate Kubernetes for validation purposes.RF classifier has shown better outcomes(99.90%accuracy)than other classifiers in detecting anomalies/intrusions in the containerized environment. 展开更多
关键词 Software defined network network function virtualization network function virtualization management and orchestration virtual infrastructure manager virtual network function Kubernetes Kubectl artificial intelligence machine learning
下载PDF
Edge computing oriented virtual optical network mapping scheme based on fragmentation prediction
2
作者 何烁 BAI Huifeng +1 位作者 HUO Chao ZHANG Ganghong 《High Technology Letters》 EI CAS 2024年第2期158-163,共6页
As edge computing services soar,the problem of resource fragmentation situation is greatly worsened in elastic optical networks(EON).Aimed to solve this problem,this article proposes the fragmentation prediction model... As edge computing services soar,the problem of resource fragmentation situation is greatly worsened in elastic optical networks(EON).Aimed to solve this problem,this article proposes the fragmentation prediction model that makes full use of the gate recurrent unit(GRU)algorithm.Based on the fragmentation prediction model,one virtual optical network mapping scheme is presented for edge computing driven EON.With the minimum of fragmentation degree all over the whole EON,the virtual network mapping can be successively conducted.Test results show that the proposed approach can reduce blocking rate,and the supporting ability for virtual optical network services is greatly improved. 展开更多
关键词 elastic optical networks virtual optical network fragmentation self-awareness edge computing
下载PDF
Service Function Chain Migration in LEO Satellite Networks
3
作者 Geng Yuhui Wang Niwei +5 位作者 Chen Xi Xu Xiaofan Zhou Changsheng Yang Junyi Xiao Zhenyu Cao Xianbin 《China Communications》 SCIE CSCD 2024年第3期247-259,共13页
With the advancements of software defined network(SDN)and network function virtualization(NFV),service function chain(SFC)placement becomes a crucial enabler for flexible resource scheduling in low earth orbit(LEO)sat... With the advancements of software defined network(SDN)and network function virtualization(NFV),service function chain(SFC)placement becomes a crucial enabler for flexible resource scheduling in low earth orbit(LEO)satellite networks.While due to the scarcity of bandwidth resources and dynamic topology of LEO satellites,the static SFC placement schemes may cause performance degradation,resource waste and even service failure.In this paper,we consider migration and establish an online migration model,especially considering the dynamic topology.Given the scarcity of bandwidth resources,the model aims to maximize the total number of accepted SFCs while incurring as little bandwidth cost of SFC transmission and migration as possible.Due to its NP-hardness,we propose a heuristic minimized dynamic SFC migration(MDSM)algorithm that only triggers the migration procedure when new SFCs are rejected.Simulation results demonstrate that MDSM achieves a performance close to the upper bound with lower complexity. 展开更多
关键词 network function virtualization(NFV) resource allocation satellite networks service function chain(SFC) SFC migration SFC placement soft-ware defined network(SDN)
下载PDF
A highly reliable embedding algorithm for airborne tactical network virtualization 被引量:2
4
作者 MIAO Jingcheng LYU Na +2 位作者 CHEN Kefan CHEN Zhuo GAO Weiting 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2021年第6期1364-1374,共11页
The evolution of airborne tactical networks(ATNs)is impeded by the network ossification problem.As a solution,network virtualization(NV)can provide a flexible and scalable architecture where virtual network embedding(... The evolution of airborne tactical networks(ATNs)is impeded by the network ossification problem.As a solution,network virtualization(NV)can provide a flexible and scalable architecture where virtual network embedding(VNE)is a key part.However,existing VNE algorithms cannot be optimally adopted in the virtualization of ATN due to the complex interference in aircombat field.In this context,a highly reliable VNE algorithm based on the transmission rate for ATN virtualization(TR-ATVNE)is proposed to adapt well to the specific electromagnetic environment of ATN.Our algorithm coordinates node and link mapping.In the node mapping,transmission-rate resource is firstly defined to effectively evaluate the ranking value of substrate nodes under the interference of both environmental noises and enemy attacks.Meanwhile,a feasible splitting rule is proposed for path splitting in the link mapping,considering the interference between wireless links.Simulation results reveal that our algorithm is able to improve the acceptance ratio of virtual network requests while maintaining a high revenue-to-cost ratio under the complex electromagnetic interference. 展开更多
关键词 airborne tactical network(ATN) network virtualization(NV) resource allocation virtual network embedding(VNE) transmission rate
下载PDF
Enhanced Reliability in Network Function Virtualization by Hybrid Hexagon-Cost Efficient Algorithm
5
作者 D.Jeyakumar C.Rajabhushanam 《Computer Systems Science & Engineering》 SCIE EI 2022年第12期1131-1144,共14页
In this,communication world, the Network Function Virtualization concept is utilized for many businesses, small services to virtualize the network nodefunction and to build a block that may connect the chain, communi... In this,communication world, the Network Function Virtualization concept is utilized for many businesses, small services to virtualize the network nodefunction and to build a block that may connect the chain, communication services.Mainly, Virtualized Network Function Forwarding Graph (VNF-FG) has beenused to define the connection between the VNF and to give the best end-to-endservices. In the existing method, VNF mapping and backup VNF were proposedbut there was no profit and reliability improvement of the backup and mapping ofthe primary VNF. As a consequence, this paper offers a Hybrid Hexagon-CostEfficient algorithm for determining the best VNF among multiple VNF and backing up the best VNF, lowering backup costs while increasing dependability. TheVNF is chosen based on the highest cost-aware important measure (CIM) rate,which is used to assess the relevance of the VNF forwarding graph.To achieveoptimal cost-efficiency, VNF with the maximum CIM is selected. After the selection process, updating is processed by three steps which include one backup VNFfrom one SFC, two backup VNF from one Service Function Chain (SFC),and twobackup VNF from different SFC. Finally, this proposed method is compared withCERA, MinCost, MaxRbyInr based on backup cost, number of used PN nodes,SFC request utility, and latency. The simulation result shows that the proposedmethod cuts down the backup cost and computation time by 57% and 45% compared with the CER scheme and improves the cost-efficiency. As a result, this proposed system achieves less backup cost, high reliability, and low timeconsumption which can improve the Virtualized Network Function operation. 展开更多
关键词 network function virtualized(NFV) hybrid hexagon-cost efficient algorithm(HH-CE) cost-aware important measure(CIM) RELIABILITY network services
下载PDF
Network Function Virtualization Technology:Progress and Standardization
6
作者 Huiling Zhao Yunpeng Xie Fan Shi 《ZTE Communications》 2014年第2期3-7,共5页
Network innovation and business transformation are both necessary for telecom operators to adapt to new situations, but operators face challenges in terms of network bearer complexity, business centralization, and IT/... Network innovation and business transformation are both necessary for telecom operators to adapt to new situations, but operators face challenges in terms of network bearer complexity, business centralization, and IT/CT integration. Network function virtualization (NFV) may inspire new development ideas, but many doubts still exist within industry, especially about how to introduce NFV into an operator' s network. This article describes the latest progress in NFV standardization, NFV requirements and hot technology issues, and typical NFV applications in an operator networks. 展开更多
关键词 network functions virtualization (NFV) overlay network virtual extensible LAN (VXLAN) service chaining
下载PDF
SFC Design and VNF Placement Based on Traffic Volume Scaling and VNF Dependency in 5G Networks
7
作者 Zhihao Zeng Zixiang Xia +1 位作者 Xiaoning Zhang Yexiao 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第3期1791-1814,共24页
The development of Fifth-Generation(5G)mobile communication technology has remarkably promoted the spread of the Internet of Things(IoT)applications.As a promising paradigm for IoT,edge computing can process the amoun... The development of Fifth-Generation(5G)mobile communication technology has remarkably promoted the spread of the Internet of Things(IoT)applications.As a promising paradigm for IoT,edge computing can process the amount of data generated by mobile intelligent devices in less time response.Network Function Virtualization(NFV)that decouples network functions from dedicated hardware is an important architecture to implement edge computing,deploying heterogeneous Virtual Network Functions(VNF)(such as computer vision,natural language processing,intelligent control,etc.)on the edge service nodes.With the NFV MANO(Management and Orchestration)framework,a Service Function Chain(SFC)that contains a set of ordered VNFs can be constructed and placed in the network to offer a customized network service.However,the procedure of NFV orchestration faces a technical challenge in minimizing the network cost of VNF placement due to the complexity of the changing effect of traffic volume and the dependency on theVNFrelationship.To this end,we jointly optimize SFC design and VNF placement to minimize resource cost while taking account of VNF dependency and traffic volume scaling.First,the problem is formulated as an Integer Linear Programming(ILP)model and proved NPhard by reduction from Hamiltonian Cycle problem.Then we proposed an efficient heuristic algorithm called Traffic Aware and Interdependent VNF Placement(TAIVP)to solve the problem.Compared with the benchmark algorithms,emulation results show that our algorithm can reduce network cost by 10.2%and increase service request acceptance rate by 7.6%on average. 展开更多
关键词 network function virtualization virtual network function service function chain resource allocation routing
下载PDF
Software defined satellite networks:A survey
8
作者 Weiwei Jiang 《Digital Communications and Networks》 SCIE CSCD 2023年第6期1243-1264,共22页
In recent years,satellite networks have been proposed as an essential part of next-generation mobile communication systems.Software defined networking techniques are introduced in satellite networks to handle the grow... In recent years,satellite networks have been proposed as an essential part of next-generation mobile communication systems.Software defined networking techniques are introduced in satellite networks to handle the growing challenges induced by time-varying topology,intermittent inter-satellite link and dramatically increased satellite constellation size.This survey covers the latest progress of software defined satellite networks,including key techniques,existing solutions,challenges,opportunities,and simulation tools.To the best of our knowledge,this paper is the most comprehensive survey that covers the latest progress of software defined satellite networks.An open GitHub repository is further created where the latest papers on this topic will be tracked and updated periodically.Compared with these existing surveys,this survey contributes from three aspects:(1)an up-to-date SDN-oriented review for the latest progress of key techniques and solutions in software defined satellite networks;(2)an inspiring summary of existing challenges,new research opportunities and publicly available simulation tools for follow-up studies;(3)an effort of building a public repository to track new results. 展开更多
关键词 Mobility management Satellite network SDN controller placement Software defined networking Virtual network embedding
下载PDF
Adaptive Partial Task Offloading and Virtual Resource Placement in SDN/NFV-Based Network Softwarization
9
作者 Prohim Tam Sa Math Seokhoon Kim 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期2141-2154,共14页
Edge intelligence brings the deployment of applied deep learning(DL)models in edge computing systems to alleviate the core backbone network congestions.The setup of programmable software-defined networking(SDN)control... Edge intelligence brings the deployment of applied deep learning(DL)models in edge computing systems to alleviate the core backbone network congestions.The setup of programmable software-defined networking(SDN)control and elastic virtual computing resources within network functions virtualization(NFV)are cooperative for enhancing the applicability of intelligent edge softwarization.To offer advancement for multi-dimensional model task offloading in edge networks with SDN/NFV-based control softwarization,this study proposes a DL mechanism to recommend the optimal edge node selection with primary features of congestion windows,link delays,and allocatable bandwidth capacities.Adaptive partial task offloading policy considered the DL-based recommendation to modify efficient virtual resource placement for minimizing the completion time and termination drop ratio.The optimization problem of resource placement is tackled by a deep reinforcement learning(DRL)-based policy following the Markov decision process(MDP).The agent observes the state spaces and applies value-maximized action of available computation resources and adjustable resource allocation steps.The reward formulation primarily considers taskrequired computing resources and action-applied allocation properties.With defined policies of resource determination,the orchestration procedure is configured within each virtual network function(VNF)descriptor using topology and orchestration specification for cloud applications(TOSCA)by specifying the allocated properties.The simulation for the control rule installation is conducted using Mininet and Ryu SDN controller.Average delay and task delivery/drop ratios are used as the key performance metrics. 展开更多
关键词 Deep learning partial task offloading software-defined networking virtual machine virtual network functions
下载PDF
A dynamic and resource sharing virtual network mapping algorithm
10
作者 Xiancui Xiao Xiangwei Zheng +2 位作者 Ji Bian Cun Ji Xinchun Cui 《Digital Communications and Networks》 SCIE CSCD 2023年第5期1101-1112,共12页
Network virtualization can effectively establish dedicated virtual networks to implement various network functions.However,the existing research works have some shortcomings,for example,although computing resource pro... Network virtualization can effectively establish dedicated virtual networks to implement various network functions.However,the existing research works have some shortcomings,for example,although computing resource properties of individual nodes are considered,node storage properties and the network topology properties are usually ignored in Virtual Network(VN)modelling,which leads to the inaccurate measurement of node availability and priority.In addition,most static virtual network mapping methods allocate fixed resources to users during the entire life cycle,and the users’actual resource requirements vary with the workload,which results in resource allocation redundancy.Based on the above analysis,in this paper,we propose a dynamic resource sharing virtual network mapping algorithm named NMA-PRS-VNE,first,we construct a new,more realistic network framework in which the properties of nodes include computing resources,storage resources and topology properties.In the node mapping process,three properties of the node are used to measure its mapping ability.Second,we consider the resources of adjacent nodes and links instead of the traditional method of measuring the availability and priority of nodes by considering only the resource properties,so as to more accurately select the physical mapping nodes that meet the constraints and conditions and improve the success rate of subsequent link mapping.Finally,we divide the resource requirements of Virtual Network Requests(VNRs)into basic subrequirements and variable sub-variable requirements to complete dynamic resource allocation.The former represents monopolizing resource requirements by the VNRs,while the latter represents shared resources by many VNRs with the probability of occupying resources,where we keep a balance between resource sharing and collision among users by calculating the collision probability.Simulation results show that the proposed NMAPRS-VNE can increase the average acceptance rate and network revenue by 15%and 38%,and reduce the network cost and link pressure by 25%and 17%. 展开更多
关键词 network virtualization VNRs network frameworks Dynamic resource allocation Resource sharing
下载PDF
Development Methodologies for Network Softwarization: A Comparison of DevOps, NetOps, and Verification
11
作者 Mehmet Beyaz 《International Journal of Communications, Network and System Sciences》 2023年第5期97-104,共8页
This white paper explores three popular development methodologies for network softwarization: DevOps, NetOps, and Verification. The paper compares and contrasts the strengths and weaknesses of each approach and provid... This white paper explores three popular development methodologies for network softwarization: DevOps, NetOps, and Verification. The paper compares and contrasts the strengths and weaknesses of each approach and provides recommendations for organizations looking to adopt network softwarization. 展开更多
关键词 Development Methodologies network Softwarization DevOps NetOps VERIFICATION Software-Defined networking network Function virtualization Automation COLLABORATION Testing Validation network Operations network Management
下载PDF
Research on Construction Scheme of Cloud Platform for Core Network Equipment of Railway 5G Private Network
12
作者 LIU Lihai XI Min +1 位作者 DING Jianwen QIAN Jun 《Chinese Railways》 2023年第1期54-61,共8页
This paper studies and analyzes the rigorous requirements of railway 5G private network core network(5GC)equipment based on network function virtualization(NFV)technology in terms of reliability,security,latency and o... This paper studies and analyzes the rigorous requirements of railway 5G private network core network(5GC)equipment based on network function virtualization(NFV)technology in terms of reliability,security,latency and other aspects of communication cloud,compares cloud platform schemes with different decoupling modes,and proposes that railway 5GC should be implemented by software and hardware integration scheme or software and hardware two-layer decoupling scheme.At the same time,the redundancy and disaster recovery schemes and measures that can be taken by 5GC based on cloud platform are proposed.Finally,taking the products of ZTE Corporation as an example,the implementation architecture of railway 5GC cloud platform in 1+1 redundancy mode is given.It serves as a reference for the engineering construction of 5G-R core network. 展开更多
关键词 5GC 5G-R core network equipment DECOUPLING network function virtualization cloud platform
下载PDF
Virtual 5G Network Embedding in a Heterogeneous and Multi-Domain Network Infrastructure 被引量:6
13
作者 Cunqian Yu Weigang Hou +2 位作者 Yingying Guan Yue Zong Pengxing Guo 《China Communications》 SCIE CSCD 2016年第10期29-43,共15页
The pursuit of the higher performance mobile communications forces the emergence of the fifth generation mobile communication(5G). 5G network, integrating wireless and wired domain, can be qualified for the complex vi... The pursuit of the higher performance mobile communications forces the emergence of the fifth generation mobile communication(5G). 5G network, integrating wireless and wired domain, can be qualified for the complex virtual network work oriented to the cross-domain requirement. In this paper, we focus on the multi-domain virtual network embedding in a heterogeneous 5G network infrastructure, which facilitates the resource sharing for diverse-function demands from fixed/mobile end users. We proposed the mathematical ILP model for this problem.And based on the layered-substrate-resource auxiliary graph and an effective six-quadrant service-type-judgment method, 5G embedding demands can be classified accurately to match different user access densities. A collection of novel heuristic algorithms of virtual 5G network embedding are proposed. A great deal of numerical simulation results testified that our algorithm performed better in terms of average blocking rate, routing latency and wireless/wired resource utilization, compared with the benchmark. 展开更多
关键词 5G virtual network embedding heterogeneous and multi-domain infrastructure wireless channel capacity data center
下载PDF
A Survey of Embedding Algorithm for Virtual Network Embedding 被引量:5
14
作者 Haotong Cao Shengchen Wu +2 位作者 Yue Hu Yun Liu Longxiang Yang 《China Communications》 SCIE CSCD 2019年第12期1-33,共33页
Network virtualization(NV) is pushed forward by its proponents as a crucial attribute of next generation network, aiming at overcoming the gradual ossification of current networks, particularly to the worldwide Intern... Network virtualization(NV) is pushed forward by its proponents as a crucial attribute of next generation network, aiming at overcoming the gradual ossification of current networks, particularly to the worldwide Internet. Through virtualization, multiple customized virtual networks(VNs), requested by users, are allowed to coexist on the underlying substrate networks(SNs). In addition, the virtualization scheme contributes to sharing underlying physical resources simultaneously and seamlessly. However, multiple technical issues still stand in the way of NV successful implementation. One key technical issue is virtual network embedding(VNE), known as the resource allocation problem for NV. This paper conducts a survey of embedding algorithms for VNE problem. At first, the NV business model for VNE problem is presented. Then, the latest VNE problem description is presented. Main performance metrics for evaluating embedding algorithms are also involved. Afterwards, existing VNE algorithms are detailed, according to the novel proposed category approach. Next, key future research aspects of embedding algorithms are listed out. Finally, the paper is briefly concluded. 展开更多
关键词 network virtualization virtual network embedding embedding algorithms key future research aspects
下载PDF
An Exact Virtual Network Embedding Algorithm Based on Integer Linear Programming for Virtual Network Request with Location Constraint 被引量:3
15
作者 Zeheng Yang Yongan Guo 《China Communications》 SCIE CSCD 2016年第8期177-183,共7页
Network virtualization is known as a promising technology to tackle the ossification of current Internet and will play an important role in the future network area. Virtual network embedding(VNE) is a key issue in net... Network virtualization is known as a promising technology to tackle the ossification of current Internet and will play an important role in the future network area. Virtual network embedding(VNE) is a key issue in network virtualization. VNE is NP-hard and former VNE algorithms are mostly heuristic in the literature.VNE exact algorithms have been developed in recent years. However, the constraints of exact VNE are only node capacity and link bandwidth.Based on these, this paper presents an exact VNE algorithm, ILP-LC, which is based on Integer Linear Programming(ILP), for embedding virtual network request with location constraints. This novel algorithm is aiming at mapping virtual network request(VNR) successfully as many as possible and consuming less substrate resources.The topology of each VNR is randomly generated by Waxman model. Simulation results show that the proposed ILP-LC algorithm outperforms the typical heuristic algorithms in terms of the VNR acceptance ratio, at least 15%. 展开更多
关键词 network virtualization virtual network embedding exact VNE algorithm integer linear Programming location constraint VNR acceptance ratio
下载PDF
Node Ranking Strategy in Virtual Network Embedding: An Overview 被引量:3
16
作者 Shengchen Wu Hao Yin +2 位作者 Haotong Cao Longxiang Yang Hongbo Zhu 《China Communications》 SCIE CSCD 2021年第6期114-136,共23页
Network virtualization(NV)is a highprofile way to solve the ossification problem of the nowadays Internet,and be able to support the diversified network naturally.In NV,Virtual Network Embedding(VNE)problem has been w... Network virtualization(NV)is a highprofile way to solve the ossification problem of the nowadays Internet,and be able to support the diversified network naturally.In NV,Virtual Network Embedding(VNE)problem has been widely considered as a crucial issue,which is aimed to embed Virtual Networks(VNs)onto the shared substrate networks(SNs)efficiently.Recently,some VNE approaches have developed Node Ranking strategies to drive and enhance the embedding efficiency.Node Ranking Strategy rank/sort the nodes according to the attributes of the node,including both residual local attributes(CPU,Bandwidth,storage,Etc.)and the global topology attributes(Number of neighborhood Nodes,Delay to other nodes,Etc.).This paper presents an overview of Node Ranking Strategies in Virtual Network Embedding,and possible directions of VNE Node Ranking Strategy. 展开更多
关键词 network virtualization virtual network embedding global topology attribute node ranking
下载PDF
The Supernetwork Model of Social Networking Services 被引量:4
17
作者 尚艳超 王恒山 王艳灵 《Journal of Donghua University(English Edition)》 EI CAS 2012年第1期37-39,共3页
The unique ways of information organization and dissemination was examined through the microblog and the real-name social network as the representatives of the new virtual social networks. In order to discuss the inte... The unique ways of information organization and dissemination was examined through the microblog and the real-name social network as the representatives of the new virtual social networks. In order to discuss the interrelation and interaction of the two dimensions-topic and user, a supernetwork model was established based on the supernetwork research method. Through the actual data, a supernetwork topology diagram and the changing rule of user participation were attained. And it was concluded that the key factor of dealing with emergent online public sentiment should start with affecting the opinions of key figures, whose opinions would further affect the public opinions. 展开更多
关键词 virtual community network SUPERnetwork HYPERGRAPH emergent online public sentiment
下载PDF
Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppers 被引量:2
18
作者 Bassma S.Alsulami Chandra Bajracharya Danda B.Rawat 《Digital Communications and Networks》 SCIE CSCD 2021年第3期327-334,共8页
Dynamic spectrum sharing and cognitive radio networks were proposed to enhance the Radio Frequency(RF)spectrum utilization.However,there are several challenges to realize them in real systems,such as sensing uncertain... Dynamic spectrum sharing and cognitive radio networks were proposed to enhance the Radio Frequency(RF)spectrum utilization.However,there are several challenges to realize them in real systems,such as sensing uncertainty causing issues to licensed users,business models for licensed service providers.Wireless virtualization is regarded as a technology that leverages service level agreements to sublease unused or underutilized RF spectrum that addresses aforementioned issues and helps to significantly enhance the utilization of the RF spectrum,offer improved coverage and capacity of networks,enhance network security and reduce energy consumption.With wireless virtualization,wireless networks'physical substrate is shared and reconfigured dynamically between virtual wireless networks through Mobile Virtual Network Operations(MVNOs).Wireless virtualization with dynamic configurable features of Wireless Infrastructure Providers(WIPs),virtualized wireless networks are vulnerable to a multitude of attacks,including jamming attacks and eavesdropping attacks.This paper investigates a means of defense through the employment of coalition game theory when jammers try to degrade the signal quality of legitimate users,and eavesdroppers aim to reduce secrecy rates.Specifically,we consider a virtual wireless network where MVNO users'job is to improve their Signal to Interference plus Noise Ratio(SINR)while the jammers target to collectively enhance their Jammer Received Signal Strength(JRSS),and an eavesdropper's goal is to reduce the overall secrecy rate.Numerical results have demonstrated that the proposed game strategies are effective(in terms of data rate,secrecy rate and latency)against such attackers compared to the traditional approaches. 展开更多
关键词 Game theory based security Virtual wireless networks Jamming and eavesdropping
下载PDF
Virtualized Wireless SDNs:Modelling Delay Through the Use of Stochastic Network Calculus 被引量:1
19
作者 Lianming Zhang Jia Liu Kun Yang 《ZTE Communications》 2014年第2期50-56,共7页
Software-defined networks (SDN) have attracted much attention recently because of their flexibility in terms of network management. Increasingly, SDN is being introduced into wireless networks to form wireless SDN. ... Software-defined networks (SDN) have attracted much attention recently because of their flexibility in terms of network management. Increasingly, SDN is being introduced into wireless networks to form wireless SDN. One enabling technology for wireless SDN is network virtualization, which logically divides one wireless network element, such as a base station, into multiple slices, and each slice serving as a standalone virtual BS. In this way, one physical mobile wireless network can be partitioned into multiple virtual networks in a software-defined manner. Wireless virtual networks comprising virtual base stations also need to provide QoS to mobile end-user services in the same context as their physical hosting networks. One key QoS parameter is delay. This paper presents a delay model for software-defined wireless virtual networks. Network calculus is used in the modelling. In particular, stochastic network calculus, which describes more realistic models than deterministic network calculus, is used. The model enables theoretical investigation of wireless SDN, which is largely dominated by either algorithms or prototype implementations. 展开更多
关键词 wireless software defined networks (SDN) wireless network virtualization QoS modelling upper bound delay stochastic networkcalculus
下载PDF
Virtualizing Network and Service Functions: Impact on ICT Transformation and Standardization 被引量:1
20
作者 Bhumip Khasnabish Jie Hu Ghazanfar Ali 《ZTE Communications》 2013年第4期40-46,共7页
Virtualization of network/service functions means time sharing network/service(and affiliated)resources in a hyper speed manner.The concept of time sharing was popularized in the 1970s with mainframe computing.The s... Virtualization of network/service functions means time sharing network/service(and affiliated)resources in a hyper speed manner.The concept of time sharing was popularized in the 1970s with mainframe computing.The same concept has recently resurfaced under the guise of cloud computing and virtualized computing.Although cloud computing was originally used in IT for server virtualization,the ICT industry is taking a new look at virtualization.This paradigm shift is shaking up the computing,storage,networking,and ser vice industries.The hope is that virtualizing and automating configuration and service management/orchestration will save both capes and opex for network transformation.A complimentary trend is the separation(over an open interface)of control and transmission.This is commonly referred to as software defined networking(SDN).This paper reviews trends in network/service functions,efforts to standardize these functions,and required management and orchestration. 展开更多
关键词 network function virtualization(NFV) and chaining service function virtualization(SFV) and chaining network virtualization overlay(NVO) software defined networking(SDN) networking economics
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部