• Title/Summary/Keyword: virtualization scenario

Search Result 9, Processing Time 0.026 seconds

Wireless Access Network Architecture and Virtualization Scenarios for Next-Generation Mobile Communication Networks (차세대 이동통신 네트워크를 위한 무선 액세스 망 구조 및 가상화 시나리오)

  • Kim, Myunghwan;Kim, Su Min;Jung, Bang Chul;Park, Yeoun-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.10
    • /
    • pp.2150-2162
    • /
    • 2012
  • In accordance with evolution of next-generation mobile Internet, 2G, 3G, 4G, and B4G mobile communication wireless access networks will be co-existed and service providers will be merged as an integrated service provider. In addition, multiple virtual service operators will appear. In order to provide complicated unified-services, in the future Internet, wireless network virtualization where network resource is shared by various service operators is necessary. Therefore, in this paper, we investigate network architectures and virtualization scenarios for wireless access network virtualization where various wireless access technologies are flexibly operated by multiple service providers over next-generation wireless access networks. We expect that the virtualization scenario and network architecture yielded from this study can play a role as a basis for development of wireless access network virtualization algorithms.

An Efficient Agent Framework for Host-based Vulnerability Assessment System in Virtualization Environment (가상화 환경에서 호스트 기반 취약점 분석 시스템을 위한 효율적인 에이전트 프레임워크)

  • Yang, Jin-Seok;Chung, Tai-Myoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.1
    • /
    • pp.23-30
    • /
    • 2014
  • In this paper, we propose an efficient agent framework for host-based vulnerability assessment system by analyzing the operational concept of traditional vulnerability assessment framework and proposed vulnerability assessment agent framework in virtualization environment. A proposed agent framework have concept by using the features of virtualization technology, it copy and execute checking agent in targeted virtual machines. In order to embody a propose agent framework, we design function block of checking agent and describe a vulnerability checking scenario of proposed agent framework. Also we develop pilot system for vulnerability checking scenario. We improve the shortcomings of the traditional vulnerability assessment system, such as unnecessary system load of the agent, inefficiency due to duplication agent installation. Moreover, the proposed agent framework is maximizing the scalability of the system because there is no agent installation when adding a targeted system.

Design and Implementation of a Device Virtualization Framework to control Virtual Desktop (가상데스크탑 제어를 위한 디바이스 가상화 프레임워크의 설계 및 구현)

  • Kang, Sang-Woo;Park, Se-Jin;Park, Chan-Ik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.6
    • /
    • pp.702-706
    • /
    • 2010
  • In this paper, we propose a framework to change local devices to networked devices by using web browser. Network devices will be used in the virtual desktop. Management software maintains a pool of devices to manage network devices. Whenever user's request is occured, virtual desktop s/w which manages desktop's I/O access device pool. Then virtual desktop s/w selects proper device and forwards I/O to desktop. In this paper, we choose RIA solution for install-free environment. Consequently, user easily enrolls and revokes their devices. User easily commands virtual desktop s/w. In the second half of this paper, we explain usage scenario and evaluate our framework to show efficiency and flexibility of the framework.

The Study on Development of Technology for Electronic Government of S. Korea with Cloud Computing analysed by the Application of Scenario Planning (한국 전자정부와 클라우드 컴퓨팅 기술개발연구 - 시나리오플래닝을 적용하여 -)

  • Lee, Sang-Yun;Yoon, Hong-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.6
    • /
    • pp.1245-1258
    • /
    • 2012
  • This study is about development of technology for electronic government of S. Korea with cloud computing analysed by the application of scenario planning. As a society of knowledge and information has been developed rapidly, because of changing from web environment to ubiquitous environment, a lot of countries across the world as well as S. Korea for e-Government have a variety of changes with cloud computing service. So this research focused on the strategy consulting of e-Government of S. Korea with development of cloud computing technology analysed by the application of 'scenario planning' as a foresight method. As a result, the future policy for development of cloud computing technology for electronic government of S. Korea is to further spur the development of technology for hard ware and internet data center as SLA(Service Level Agreement) and service provisioning, more improvement of level of technology with soft ware solution as resource virtualization, open API(Application Programming Interface).

Extracting Neural Networks via Meltdown (멜트다운 취약점을 이용한 인공신경망 추출공격)

  • Jeong, Hoyong;Ryu, Dohyun;Hur, Junbeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1031-1041
    • /
    • 2020
  • Cloud computing technology plays an important role in the deep learning industry as deep learning services are deployed frequently on top of cloud infrastructures. In such cloud environment, virtualization technology provides logically independent and isolated computing space for each tenant. However, recent studies demonstrate that by leveraging vulnerabilities of virtualization techniques and shared processor architectures in the cloud system, various side-channels can be established between cloud tenants. In this paper, we propose a novel attack scenario that can steal internal information of deep learning models by exploiting the Meltdown vulnerability in a multi-tenant system environment. On the basis of our experiment, the proposed attack method could extract internal information of a TensorFlow deep-learning service with 92.875% accuracy and 1.325kB/s extraction speed.

A Study on the Introduction of Library Services Based on Cloud Computing (클라우드 컴퓨팅 기반의 도서관 서비스 도입방안에 관한 연구)

  • Kim, Yong
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.23 no.3
    • /
    • pp.57-84
    • /
    • 2012
  • With the advent of Big data era unleashed by tremendous increase of structured and unstructured data, a library needs an effective method to store, manage and preserve various information resources. Also, needs of collaboration of libraries are continuously increased in digital environment. As an effective method to handle the changes and challenges in libraries, interest on cloud computing is growing more and more. This study aims to propose a method to introduce cloud computing in libraries. To achieve the goals, this study performed the literature review to analyze problems of existing library systems. Also, this study proposed considerations, expectations, service scenario, phased strategy to introduce cloud computing in libraries. Based on the results extracted from cases that libraries have introduced cloud computing-based systems, this study proposed introduction strategy and specific applying areas in library works as considered features of cloud computing models. The proposed phased strategy and service scenario may reduce time and effort in the process of introduction of cloud computing and maximize the effect of cloud computing.

Price-based Resource Allocation for Virtualized Cognitive Radio Networks

  • Li, Qun;Xu, Ding
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.4748-4765
    • /
    • 2016
  • We consider a virtualized cognitive radio (CR) network, where multiple virtual network operators (VNOs) who own different virtual cognitive base stations (VCBSs) share the same physical CBS (PCBS) which is owned by an infrastructure provider (InP), sharing the spectrum with the primary user (PU). The uplink scenario is considered where the secondary users (SUs) transmit to the VCBSs. The PU is protected by constraining the interference power from the SUs. Such constraint is applied by the InP through pricing the interference. A Stackelberg game is formulated to jointly maximize the revenue of the InP and the individual utilities of the VNOs, and then the Stackelberg equilibrium is investigated. Specifically, the optimal interference price and channel allocation for the VNOs to maximize the revenue of the InP and the optimal power allocation for the SUs to maximize the individual utilities of the VNOs are derived. In addition, a low‐complexity ±‐optimal solution is also proposed for obtaining the interference price and channel allocation for the VNOs. Simulations are provided to verify the proposed strategies. It is shown that the proposed strategies are effective in resource allocation and the ±‐optimal strategy achieves practically the same performance as the optimal strategy can achieve. It is also shown that the InP will not benefit from a large interference power limit, and selecting VNOs with higher unit rate utility gain to share the resources of the InP is beneficial to both the InP and the VNOs.

Digitalization of Fashion Shows in the Pandemic Era - A Focus on Fashion Films and Fashion Gamification - (팬데믹 시대의 패션쇼의 디지털화 - 패션 필름과 패션 게이미피케이션을 중심으로 -)

  • Kang, Soojung;Chun, Jaehoon
    • Fashion & Textile Research Journal
    • /
    • v.24 no.1
    • /
    • pp.29-41
    • /
    • 2022
  • With the outbreak of the COVID-19 pandemic, global fashion brands have been hosting online fashion shows instead of offline ones. In light of the current pandemic scenario, this research conducted a study on digital fashion shows held online, specifically focusing on two types of shows: fashion films and games. This study examined the characteristics of changes in digital fashion shows as well as their limitations. The case studies analyzed fashion shows from January 2020 to July 2021, with a focus on the 2021 S/S and 2021 F/W seasons, and 26 fashion shows from 23 brands. The results of this study were as follows: First, digital fashion shows transcended physical limitations through virtualization and non-face-to-face communication, breaking free of the limits of space and time in reality. Second, the entertainment role of fashion shows was strengthened. However, online fashion shows had limitations as they lacked a sense of reality and distracted viewers' attention from fashion products. This study has practical implications as it proposes a path for the development of digitalized fashion shows by addressing its current limitations. Overcoming these shortcomings, post-pandemic fashion shows would be more diverse, flexible, and creative. Consequently, following the pandemic period, we look forward to new types of fashion shows using digital imaging technologies.

Proactive Virtual Network Function Live Migration using Machine Learning (머신러닝을 이용한 선제적 VNF Live Migration)

  • Jeong, Seyeon;Yoo, Jae-Hyoung;Hong, James Won-Ki
    • KNOM Review
    • /
    • v.24 no.1
    • /
    • pp.1-12
    • /
    • 2021
  • VM (Virtual Machine) live migration is a server virtualization technique for deploying a running VM to another server node while minimizing downtime of a service the VM provides. Currently, in cloud data centers, VM live migration is widely used to apply load balancing on CPU workload and network traffic, to reduce electricity consumption by consolidating active VMs into specific location groups of servers, and to provide uninterrupted service during the maintenance of hardware and software update on servers. It is critical to use VMlive migration as a prevention or mitigation measure for possible failure when its indications are detected or predicted. In this paper, we propose two VNF live migration methods; one for predictive load balancing and the other for a proactive measure in failure. Both need machine learning models that learn periodic monitoring data of resource usage and logs from servers and VMs/VNFs. We apply the second method to a vEPC (Virtual Evolved Pakcet Core) failure scenario to provide a detailed case study.