• Title/Summary/Keyword: Virtual Network Functions

Search Result 111, Processing Time 0.026 seconds

A study on Deep Q-Networks based Auto-scaling in NFV Environment (NFV 환경에서의 Deep Q-Networks 기반 오토 스케일링 기술 연구)

  • Lee, Do-Young;Yoo, Jae-Hyoung;Hong, James Won-Ki
    • KNOM Review
    • /
    • v.23 no.2
    • /
    • pp.1-10
    • /
    • 2020
  • Network Function Virtualization (NFV) is a key technology of 5G networks that has the advantage of enabling building and operating networks flexibly. However, NFV can complicate network management because it creates numerous virtual resources that should be managed. In NFV environments, service function chaining (SFC) composed of virtual network functions (VNFs) is widely used to apply a series of network functions to traffic. Therefore, it is required to dynamically allocate the right amount of computing resources or instances to SFC for meeting service requirements. In this paper, we propose Deep Q-Networks (DQN)-based auto-scaling to operate the appropriate number of VNF instances in SFC. The proposed approach not only resizes the number of VNF instances in SFC composed of multi-tier architecture but also selects a tier to be scaled in response to dynamic traffic forwarding through SFC.

Research on DDoS Detection using AI in NFV (인공지능 기술을 이용한 NFV 환경에서의 DDoS 공격 탐지 연구)

  • Kim, HyunJin;Park, Sangho;Ryou, JaeCheol
    • Journal of Digital Contents Society
    • /
    • v.19 no.4
    • /
    • pp.837-844
    • /
    • 2018
  • Recently, the cloud technology has made dynamical network changes by enabling the construction of a logical network without building a physical network. Despite recent research on the cloud, it is necessary to study security functions for the identification of fake virtual network functions and the encryption of communication between entities. Because the VNFs are open to subscribers and able to implement service directly, which can make them an attack target. In this paper, we propose a virtual public key infrastructure mechanism that detects a fake VNFs and guarantees data security through mutual authentication between VNFs. To evaluate the virtual PKI, we built a management and orchestration environment to test the performance of authentication and key generation for data security. And we test the detection of a distributed denial of service by using several AI algorithms to enhance the security in NFV.

Perception of Virtual Assistant and Smart Speaker: Semantic Network Analysis and Sentiment Analysis (가상 비서와 스마트 스피커에 대한 인식과 기대: 의미 연결망 분석과 감성분석을 중심으로)

  • Park, Hohyun;Kim, Jang Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.213-216
    • /
    • 2018
  • As the advantages of smart devices based on artificial intelligence and voice recognition become more prominent, Virtual Assistant is gaining popularity. Virtual Assistant provides a user experience through smart speakers and is valued as the most user friendly IoT device by consumers. The purpose of this study is to investigate whether there are differences in people's perception of the key virtual assistant brand voice recognition. We collected tweets that included six keyword form three companies that provide Virtual Assistant services. The authors conducted semantic network analysis for the collected datasets and analyzed the feelings of people through sentiment analysis. The result shows that many people have a different perception and mainly about the functions and services provided by the Virtual Assistant and the expectation and usability of the services. Also, people responded positively to most keywords.

  • PDF

Architecture and Feasibility Evaluation of VSN (Virtual Switch Network) based Mobile ATM Switching System (VSN (Virtual Switch Network) 기반의 이동 ATM 교환기 구조 및 타당성 평가)

  • Kim, Dae-Sik;Han, Chi-Moon;Ryu, keun-Ho
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.10
    • /
    • pp.40-50
    • /
    • 1999
  • The novel network architecture is recently required to accommodate a variety and intelligence of communication services. It is also required to provide customized network functions and to efficiently satisfy a various user's requirements. Accordingly, open network architecture based on ATM transport network features has been mainly studied in communication network. This paper evaluates the VSN(Virtual Switch Network) characteristics in the call processing of IMT-2000 switching system, which is composed of VSN instead of ATM switch network. VSN means switch network which is composed of ATM transport network. As a result, this paper proposes new VSN based ATM-MSC architecture with integrated call and connection control systems. and evaluates call processing delay characteristics using call process procedures. Internal call processing delay is increased approximately 3.5msec than the conventional ATM switching system. The experimental values applied in the analysis condition are the load 0.8, and the 100km distance between CCCPs(Call and Connection Control Processors) and VSNs. It is confirmed that the VSN has the potentiality in the practical implementation.

  • PDF

A Case Study of the Implementation and Verification of VLAN-applied Network Based on a Five-step Scenario (5단계 시나리오에 기반한 VLAN이 적용된 네트워크 구현 및 검증 사례연구)

  • Kim, No-Whan;Park, Jin-Seob
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.1
    • /
    • pp.25-36
    • /
    • 2021
  • This paper presents a topology based on packet tracer and a five-step scenario model to make it easier for students to understand the network on which VLANs are applied. Virtual LAN (VLAN), developed as an alternative solution to the Routers that distribute broadcast traffic, is a virtual local area network that logically configured regardless of the physical network. The VLAN prevents the network performance degradation resulting from the broadcast traffic by dividing the broadcast domain so that the bandwidth can be used more efficiently. In addition, it enhances the security because on communication between the devices belonging to different VLANs is impossible. The five-step scenarios in this paper presented an efficient implementation case for students to understand and validate the various functions of VLANs through ping/telnet/tracert test and simulation, after setting up each step of programming switches and routers in the virtual network.

SoC Virtual Platform with Secure Key Generation Module for Embedded Secure Devices

  • Seung-Ho Lim;Hyeok-Jin Lim;Seong-Cheon Park
    • Journal of Information Processing Systems
    • /
    • v.20 no.1
    • /
    • pp.116-130
    • /
    • 2024
  • In the Internet-of-Things (IoT) or blockchain-based network systems, secure keys may be stored in individual devices; thus, individual devices should protect data by performing secure operations on the data transmitted and received over networks. Typically, secure functions, such as a physical unclonable function (PUF) and fully homomorphic encryption (FHE), are useful for generating safe keys and distributing data in a network. However, to provide these functions in embedded devices for IoT or blockchain systems, proper inspection is required for designing and implementing embedded system-on-chip (SoC) modules through overhead and performance analysis. In this paper, a virtual platform (SoC VP) was developed that includes a secure key generation module with a PUF and FHE. The SoC VP platform was implemented using SystemC, which enables the execution and verification of various aspects of the secure key generation module at the electronic system level and analyzes the system-level execution time, memory footprint, and performance, such as randomness and uniqueness. We experimentally verified the secure key generation module, and estimated the execution of the PUF key and FHE encryption based on the unit time of each module.

Scheduling Performance Evaluation and Testing Functions of a Connection-Oriented Packet Switching Processor (연결지향형 패킷교환 처리기의 스케줄링 성능평가 및 시험 방안 연구)

  • Kim, Ju-Young;Choi, Ki-Seok
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.40 no.1
    • /
    • pp.135-139
    • /
    • 2014
  • In a connection-oriented packet switching network, the data communication starts after a virtual circuit is established between source and destination. The virtual circuit establishment time includes the queue waiting times in the direction from source to destination and the other way around. We use this two-way queueing delay to evaluate scheduling policies of a packet switching processor through simulation studies. In this letter, we also suggest user testing functions for the packet switching processor to manage virtual circuits. By detecting error causes, the user testing helps the packet switching processor provide reliable connection-oriented services.

Separating VNF and Network Control for Hardware-Acceleration of SDN/NFV Architecture

  • Duan, Tong;Lan, Julong;Hu, Yuxiang;Sun, Penghao
    • ETRI Journal
    • /
    • v.39 no.4
    • /
    • pp.525-534
    • /
    • 2017
  • A hardware-acceleration architecture that separates virtual network functions (VNFs) and network control (called HSN) is proposed to solve the mismatch between the simple flow steering requirements and strong packet processing abilities of software-defined networking (SDN) forwarding elements (FEs) in SDN/network function virtualization (NFV) architecture, while improving the efficiency of NFV infrastructure and the performance of network-intensive functions. HSN makes full use of FEs and accelerates VNFs through two mechanisms: (1) separation of traffic steering and packet processing in the FEs; (2) separation of SDN and NFV control in the FEs. Our HSN prototype, built on NetFPGA-10G, demonstrates that the processing performance can be greatly improved with only a small modification of the traditional SDN/NFV architecture.

Modeling of Virtual Switch in Cloud System (클라우드 시스템의 가상 스위치 모델링)

  • Ro, Cheul-Woo
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.479-485
    • /
    • 2013
  • Virtualization is a promising approach to consolidating multiple online services onto a smaller number of computing resources. A virtualized server environment allows computing resources to be shared among multiple performance isolated platforms called virtual machines. Through server virtualization software, applications servers are encapsulated into VMs, and deployed with APIs on top generalized pools of CPU and memory resources. Networking and security have been moved to a software abstraction layer that transformed computing, network virtualization. And it paves the way for enterprise to rapidly deploy networking and security for any application by creating the virtual network. Stochastic reward net (SRN) is an extension of stochastic Petri nets which provides compact modeling facilities for system analysis. In this paper, we develop SRN model of network virtualization based on virtual switch. Measures of interest such as switching delay and throughput are considered. These measures are expressed in terms of the expected values of reward rate functions for SRNs. Numerical results are obtained according to the virtual switch capacity and number of active VMs.

Development of Virtual Endoscopy and Evaluation of Performance as a 3D Virtual Colonoscopy (가상내시경의 개발 및 가상 대장내시경으로 적용 시 성능평가)

  • 김정훈;이상훈;고성호;김상준
    • Journal of Biomedical Engineering Research
    • /
    • v.24 no.2
    • /
    • pp.69-75
    • /
    • 2003
  • Virtual colonoscopy is one of the Powerful tool for non-invasive colon examination and many in-vitro and in-vivo studies have shown its accuracy in Polyp or adenoma detection. But most of virtual colonoscopy requires high quality workstation and software and its cost is high to setup whole system. We developed PC-based 3D model creation and navigation program which has diverse functions. It can be easily installed to PC and connected to network system. The performance. when used as a virtual colonoscopy. is evaluated by calculating sensitivity of detection for the simulated polyp which is artificially made inside the Pig's colon and checked its clinical feasibility, Its total sensitivity is 76%. Grouping according to Polyps diameter, the sensitivity for detection of polyps 10 ㎜ or larger was 100%(40 of 40); 5.0-9.9 ㎜, 90.0(90 of 100): and smaller then 5 ㎜. 36.7%(22 of 60).