期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Virtualizing Network and Service Functions: Impact on ICT Transformation and Standardization 被引量:1
1
作者 Bhumip Khasnabish Jie Hu Ghazanfar Ali 《ZTE Communications》 2013年第4期40-46,共7页
Virtualization of network/service functions means time sharing network/service(and affiliated)resources in a hyper speed manner.The concept of time sharing was popularized in the 1970s with mainframe computing.The s... Virtualization of network/service functions means time sharing network/service(and affiliated)resources in a hyper speed manner.The concept of time sharing was popularized in the 1970s with mainframe computing.The same concept has recently resurfaced under the guise of cloud computing and virtualized computing.Although cloud computing was originally used in IT for server virtualization,the ICT industry is taking a new look at virtualization.This paradigm shift is shaking up the computing,storage,networking,and ser vice industries.The hope is that virtualizing and automating configuration and service management/orchestration will save both capes and opex for network transformation.A complimentary trend is the separation(over an open interface)of control and transmission.This is commonly referred to as software defined networking(SDN).This paper reviews trends in network/service functions,efforts to standardize these functions,and required management and orchestration. 展开更多
关键词 network function virtualization(NFV) and chaining service function virtualization(SFV) and chaining network virtualization overlay(NVO) software defined networking(SDN) networking economics
下载PDF
A New Direct Anonymous Attestation Scheme for Trusted NFV System
2
作者 CHEN Liquan ZHU Zheng +2 位作者 WANG Yansong LU Hua CHEN Yang 《ZTE Communications》 2018年第4期30-37,共8页
How to build a secure architecture for network function virtualization(NFV)is an important issue.Trusted computing has the ability to provide security for NFV and it is called trusted NFV system.In this paper,we propo... How to build a secure architecture for network function virtualization(NFV)is an important issue.Trusted computing has the ability to provide security for NFV and it is called trusted NFV system.In this paper,we propose a new NFV direct anonymous attestation(NFV-DAA)scheme based on trusted NFV architecture.It is based on the Elliptic curve cryptography and transfers the computation of variable D from the trusted platform module(TPM)to the issuer.With the mutual authentication mechanism that those existing DAA schemes do not have and an efficient batch proof and verification scheme,the performance of trusted NFV system is optimized.The proposed NFV-DAA scheme was proved to have a higher security level and higher efficiency than those existing DAA schemes.We have reduced the computation load in Join protocol from 3G_1to 2G_1 exponential operation,while the time of NFV-DAA scheme's Sign protocol is reduced up to 49%. 展开更多
关键词 NFV trusted computation DAA bilinear pairings
下载PDF
Key Technologies and Application of Edge Computing 被引量:3
3
作者 TU Yaofeng DONG Zhenjiang YANG Hongzhang 《ZTE Communications》 2017年第2期26-34,共9页
Cloud computing faces a series of challenges,such as insufficient bandwidth,unsatisfactory real-time,privacy protection,and energy consumption.To overcome the challenges,edge computing emerges.Edge computing refers to... Cloud computing faces a series of challenges,such as insufficient bandwidth,unsatisfactory real-time,privacy protection,and energy consumption.To overcome the challenges,edge computing emerges.Edge computing refers to a process where the open platform that converges the core capabilities of networks,computing,storage,and applications provides intelligent services at the network edge near the source of the objects or data to meet the critical requirements for agile connection,real-time services,data optimization,application intelligence,security and privacy protection of industry digitization.Edge computing consists of three elements:edge,computing,and intelligence.Edge computing and the Internet of Things(IoT)mutually create,and edge computing and cloud computing complement each other.In the architecture of edge computing,resources are distributed to the edge nodes,and therefore the storage system is near users while the computation function is near data.In this way,the stress on the backbone network can be lessened.With this architecture,the existing key technologies for computation,networks,and storage will change significantly.ZTE’s edge computing solutions can ensure the service quality of operators and greatly enhance the experience of mobile users. 展开更多
关键词 EDGE COMPUTING CLOUD COMPUTING IOT
下载PDF
Technical Analysis of Network Plug-in Flannel for Containers 被引量:1
4
作者 YANG Yong DONG Xiugang DONG Zhenjiang 《ZTE Communications》 2017年第4期43-46,共4页
The development of cloud computing has made container tec-hnology a hot research issue in recent years. The container technology provides a basic support for micro service architecture, while container networking play... The development of cloud computing has made container tec-hnology a hot research issue in recent years. The container technology provides a basic support for micro service architecture, while container networking plays an important role in application of the container technology. In this paper, we study the technical implementation of the Flannel module, a network plug-in for Docker containers, including its func tions, implementation principle, utilization, and performance. The performance of Flannel in different modes is further tested and analyzed in real application scenarios. 展开更多
关键词 CONTAINER TECHNOLOGY DOCKER NETWORK plug.in Flannel
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部