Post-Disaster Technologies in Network Virtualization. Chen Ma Group Meeting August, 28, 2015
|
|
|
- Annabella Cain
- 10 years ago
- Views:
Transcription
1 Post-Disaster Technologies in Network Virtualization Chen Ma Group Meeting August, 28, 2015
2 Outlines 1 Review of Post-Disaster Technologies 2 (Open Problem 1) Multiple Traveling Repairmen Problem with Reprovisioning 3 (Open Problem 2) Virtual Network Degradation Post-Disaster Technologies in Network Virtualization, Chen Ma Page 2
3 References 1. N. M. Mosharaf Kabir Chowdhurry, and Raouf Boutaba, Network Virtualization: State of the Art and Research Challenges, Communication Magazine, Kenichi Mase, How to Deliver Your Message from/to a Disaster Area, Communication Magazine, S. S. Savas, et al., Network Adaptability to Disaster Disruptions by Exploiting Degraded-Service Tolerance, Communication Magazine, N. H. Bao, et al., Global Versus Essential Post-Disaster Re-Provisioning in Telecom Mesh Networks, JOCN, A. Basta, I. B. Barla, M. Hoffmann, G. Carles, and D. A. Schupke, Failure Coverage in Optimal Virtual Networks, OFC, C. C. Meixner, et al. Cloud-Network Disaster Recovery Against Cascading Failures, Globecom Kenichi Mase, How to Deliver Your Message from/to a Disaster Area, Communication Magazine, Mahsa Pourvali, Kaile Liang, Feng Gu, Hao Bai, Khaled Shaban, Samee Khan, Nasir Ghani, Progressive Recovery For Network Virtualization After Large-Scale Disasters, ICNC 2016 (reviewed) Post-Disaster Technologies in Network Virtualization, Chen Ma Page 3
4 Background In recently years, the concept of network virtualization has attracted significant attention in both industry and academia [1]. Network virtualization is defined by decoupling the roles of the traditional Internet service providers (ISPs) into two independent entities: infrastructure providers (InPs), who manage the physical infrastructure, and service providers (SPs), who create virtual networks (VNs) by aggregating resources from multiple InPs and offer end-to-end services [1]. In the USA, Crown Castle and American Tower Corporation are the largest infrastructure providers for telecommunication. AT&T sold 9,700 wireless towers to Crown Castle in 2013, which means AT&T focus on providing service to end users [2]. In China, China Tower Corporation was established in And China Mobile, China Union, China Telecom separate their towers and basic infrastructures to China Tower [3]. Post-Disaster Technologies in Network Virtualization, Chen Ma Page 4
5 Business Model Infrastructure provider (InP): InPs deploy and actually manage the underlying physical network resources. They offer their resources through programmable interfaces to different SPs. Service provider (SP): SPs lease resources from multiple InPs to create and deploy VNs by programming allocated network resources to offer end-to-end services to end users. An SP can also provide network services to other SPs. End user: End users in the network virtualization are similar to those of the existing Internet. Post-Disaster Technologies in Network Virtualization, Chen Ma Page 5
6 Survivability of Network Virtualization Virtual Node Virtual Link Virtual Network Capacity of computing, storing, transportation, et.al. It may be out of work after the disaster. Transportation capacity. It may be disconnected after the disaster. It is composed of virtual links and nodes. And it may be disconnected after the disaster. End to end connection Affect to a connection path. Node cannot be replaced Virtual networks 1. Affect to virtual links/nodes. 2. Affect to virtual networks. Virtual node can be replaced. Such as virtual node migration. Post-Disaster Technologies in Network Virtualization, Chen Ma Page 6
7 Post-Disaster Technologies Protection [7] Reprovisioning [5,6,8] Emergence Communication [9] Repair [10] ms, preconfigured before disaster Temporary Traffic Engenerring minutes~hours, after disaster Temporary Traffic Engineering hours~days, after disaster Temporary Network Engineering Change the physical topology. hours~weeks, after disaster Permanent Network Engineering Post-Disaster Technologies in Network Virtualization, Chen Ma Page 7
8 Outlines 1 Review of Post-Disaster Technologies 2 (Open Problem 1) Multiple Traveling Repairmen Problem with Reprovisioning 3 (Open Problem 2) Virtual Network Degradation Post-Disaster Technologies in Network Virtualization, Chen Ma Page 8
9 Problem Statement Post-Disaster Technologies in Network Virtualization, Chen Ma Page 9
10 Recovery without Reprovisioning Number of FVL r 1 r 2 r b 1 b 2 f 14 f 7 f 2 f 1 f 10 b 3 f 11 f 8 f 5 f 4 f 15 D FVL =5.76*8+7.29*6 f 2 -i 2 k 3 -l 3 t 3 t 4 t 7 t 10 t (h) Repair Time f f 9 f 12 f 13 n 4 -k 4 f 4 -n 4 i 2 -k 2 t 12 t 13 t 14 f 3 q 3 -o 3 h 1 -m 1 h 4 -n *4+1.63*2 = Post-Disaster Technologies in Network Virtualization, Chen Ma Page 10
11 Recovery with Reprovisioning Post-Disaster Technologies in Network Virtualization, Chen Ma Page 11
12 Recovery with Reprovisioning Number of FVL r 1 r 2 r b 1 b 2 b 3 f 14 f 7 f 2 f 11 h 1 -m 1 k 2 -m 2 m 2 -q 2 k 3 -m 3 m 3 -q 3 f 1 f 10 f 8 f 5 f 4 t 3 t 4 t 7 t 10 t (h) Repair Time f f 9 f 12 f 13 n 4 -k 4 f 4 -n 4 h 4 -n 4 t 12 t 13 t 14 f 15 f 3 D FVL =4.32*8+8.73*3 =60.75 Post-Disaster Technologies in Network Virtualization, Chen Ma Page 12
13 Two Problems of MTRPR How to find a repair schedule? How to figure out the damage of a schedule? Post-Disaster Technologies in Network Virtualization, Chen Ma Page 13
14 How to figure out the damage of a schedule. Given: A repair schedule. Output: Damage caused by the FVL and DVN in the schedule. Recovery with Reprovisioning Begin Recovery without Reprovisioning Begin All FPLs are repaired? End Yes No Reprovisioning Repair All FPLs are repaired? End Yes No Repair Post-Disaster Technologies in Network Virtualization, Chen Ma Page 14
15 How to find a repair schedule. Genetic Algorithm Repair Schedule Multiple Chromosomes Post-Disaster Technologies in Network Virtualization, Chen Ma Page 15
16 Genetic Operators Internal-route operator External-route operator Internal-route inversion Internal-route transposition External-route transposition Post-Disaster Technologies in Network Virtualization, Chen Ma Page 16
17 Process of GA Operate to a new new with C new Begin If new is accepted Yes new Initialize set of schedule S=null No If continuous K new are not accepted No Initialize schedule with damage C Yes Find the with minimum damage C in S End Post-Disaster Technologies in Network Virtualization, Chen Ma Page 17
18 Outlines 1 Review of Post-Disaster Technologies 2 (Open Problem 1) Multiple Traveling Repairmen Problem with Reprovisioning 3 (Open Problem 2) Virtual Network Degradation Post-Disaster Technologies in Network Virtualization, Chen Ma Page 18
19 Virtual Network Degradation (VND) After a disaster occurs, which virtual network should be degraded? what we can do to degrade the virtual networks? which is different with the degradation in end to end connection? May be the answer: In the schedule, network operators can select minimum the number of degraded virtual networks as the objective. (1) Degrade the capacity of virtual links. (2) Delete several virtual links of a degraded virtual network. Network operators should consider the connectivity of virtual networks. Post-Disaster Technologies in Network Virtualization, Chen Ma Page 19
20 Thanks! Biswanath Mukherjee Charles U Martel Massimo Tornatore Everyone! 谢 谢! Post-Disaster Technologies in Network Virtualization, Chen Ma Page 20
INTRODUCTION TO NETWORK VIRTUALIZATION
1 INTRODUCTION TO NETWORK VIRTUALIZATION Wednesday, May 14, 2008 Mosharaf Chowdhury Member, envy Project What is Virtualization? 2 Transparent abstraction of computing platform and resources Multiple logical
Network Virtualization: A Tutorial
Network Virtualization: A Tutorial George N. Rouskas Department of Computer Science North Carolina State University http://rouskas.csc.ncsu.edu/ Network Virtualization: A Tutorial OFC 2012, March 2012
White Paper. Requirements of Network Virtualization
White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction
Progressive Recovery For Network Virtualization After Large-Scale Disasters
1 Progressive Recover For Network Virtualization After Large-Scale Disasters Mahsa Pourvali 1, Kaile Liang 2, Feng Gu 3, Hao Bai 1, Khaled Shaban 4, Samee Khan 5, Nasir Ghani 1 1 Universit of South Florida,
Network Virtualization issues on Market Oriented. Eui-Nam Huh
Network Virtualization issues on Market Oriented Cloud Computing Presented By Eui-Nam Huh Kyung Hee University Contents Introduction ti of Network Virtualization ti Related Projects Research Direction
Disaster-Resilient Virtual-Network Mapping and Adaptation in Optical Networks
Disaster-Resilient Virtual-Network Mapping and Adaptation in Optical Networks Carlos Colman Meixner, Ferhat Dikiyik, Massimo Tornatore, Chen-Nee Chuah, and Biswanath Mukherjee University of California,
Disaster-Resilient Backbone and Access Networks
The Workshop on Establishing Resilient Life-Space in the Cyber-Physical Integrated Society, March. 17, 2015, Sendai, Japan Disaster-Resilient Backbone and Access Networks Shigeki Yamada ([email protected])
Business Case for Cisco SDN for the WAN
Business Case for Cisco SDN for the WAN s Executive Summary Traffic requirements are growing rapidly because of the widespread acceptance of online video services, cloud computing, and mobile broadband.
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
Intelligent Load Balancing: Overflow Balance
More Bandwidth. More Reliability. More Survivability Intelligent Load Balancing: Overflow Balance Application Note Understanding Outbound Balance Routing The BODi delivers a simple, cost effective way
White Paper on NETWORK VIRTUALIZATION
White Paper on NETWORK VIRTUALIZATION INDEX 1. Introduction 2. Key features of Network Virtualization 3. Benefits of Network Virtualization 4. Architecture of Network Virtualization 5. Implementation Examples
CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
FAQ: BroadLink Multi-homing Load Balancers
FAQ: BroadLink Multi-homing Load Balancers BroadLink Overview Outbound Traffic Inbound Traffic Bandwidth Management Persistent Routing High Availability BroadLink Overview 1. What is BroadLink? BroadLink
Resilience in Networks: Elements and Approach for a Trustworthy Infrastructure. Andreas Fischer and Hermann de Meer
Resilience in Networks: Elements and Approach for a Trustworthy Infrastructure Andreas Fischer and Hermann de Meer The ResumeNet project Resilience & Survivability for future networking framework, mechanisms
Network Virtualization: State of the Art and Research Challenges
1 Network Virtualization: State of the Art and Research Challenges N.M. Mosharaf Kabir Chowdhury and Raouf Boutaba, University of Waterloo Abstract Recently network virtualization has been pushed forward
Virtual Network Provisioning and Fault-Management across Multiple Domains
Virtual Network Provisioning and Fault-Management across Multiple Domains Distinguished Speaker Series Democritus University of Thrace, Greece Panagiotis Papadimitriou November 2010 Introduction The Internet
Evolution of telecom network infrastructure for broadcast and interactive applications
Evolution of telecom network infrastructure for broadcast and interactive applications Fabio Tassara Business Development Director Alcatel-Lucent Optics Networks 2007 To IP and beyond! European Broadcasting
How To Understand The Power Of Icdn
MobiArch 2014 R-iCDN: an Approach Supporting Flexible Content Routing for ISP-operated CDN Song Ci High Performance Network Lab, Institute of Acoustics, Chinese Academy of Sciences Outline I. Background
Wireless Video Best Practices Guide
Wireless Video Best Practices Guide Using Digital Video Manager (DVM) with the OneWireless Universal Mesh Network Authors: Annemarie Diepenbroek DVM Product Manager Soroush Amidi OneWireless Product Manager
A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks
A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashhad, Mashhad, Iran [email protected]
The 700 MHz Band. Impact of the UHF spectrum reallocation on TV markets in Europe. 38 th EPRA meeting, Vilnius, October 2013
38 th EPRA meeting, Vilnius, October 2013 The 700 MHz Band Impact of the UHF spectrum reallocation on TV markets in Europe Darko Ratkaj European Broadcasting Union FOUR WAYS TO RECEIVE TV SERVICES Terrestrial
Virtual Network Services As Enabler of Dynamic Application-Aware Traffic Engineering Masato Tsuru
Virtual Network Services As Enabler of Dynamic Application-Aware Traffic Engineering Masato Tsuru Network Design Research Center, Kyushu Institute of Technology, Japan Ultimate Goal (or Problems already
Mobile Broadband Technology & Services: Sustainability Factors
Mobile Broadband Technology & Services: Sustainability Factors Fisseha Mekuria (PhD.) CSIR Modelling and Digital Sciences, Mobile Computing Platforms. Pretoria 0001, South Africa. [email protected] Abstract:
Wireless Clinical Monitoring @ Scale!
Wireless Clinical Monitoring @ Scale! Chenyang Lu! Cyber-Physical Systems Laboratory! Department of Computer Science and Engineering! Motivation!! Clinical deterioration in hospitalized patients! " 4-17%
Network Architecture and Topology
1. Introduction 2. Fundamentals and design principles 3. Network architecture and topology 4. Network control and signalling 5. Network components 5.1 links 5.2 switches and routers 6. End systems 7. End-to-end
Records management in SharePoint 2010
Records management in SharePoint 2010 Implications and issues Crown copyright 2011 You may re-use this information (excluding logos) free of charge in any format or medium, under the terms of the Open
SURVEY ON GREEN CLOUD COMPUTING DATA CENTERS
SURVEY ON GREEN CLOUD COMPUTING DATA CENTERS ¹ONKAR ASWALE, ²YAHSAVANT JADHAV, ³PAYAL KALE, 4 NISHA TIWATANE 1,2,3,4 Dept. of Computer Sci. & Engg, Rajarambapu Institute of Technology, Islampur Abstract-
A Network Management Software Based on Secure Shell (SSH) Channels. and Java Universal Network Graph (JUNG)
A Network Management Software Based on Secure Shell (SSH) Channels and Java Universal Network Graph (JUNG) Students: Simran Khalsa, Gerald Castaneda, Ruben Rivera. Mentor: Dr. Jorge Crichigno Department
MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper
MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations
The Analysis and Simulation of VoIP
ENSC 427 Communication Networks Spring 2013 Final Project The Analysis and Simulation of VoIP http://www.sfu.ca/~cjw11/427project.html Group #3 Demet Dilekci [email protected] Conrad Wang [email protected] Jiang
1+1: Protected Microwave Links
1+1: Protected Microwave Links Abstract This paper deals with the methods of increasing the uptime of a single microwave link. Setting up a fully protected radio link implies network element redundancy.
CS6204 Advanced Topics in Networking
CS6204 Advanced Topics in Networking Assoc Prof. Chan Mun Choon School of Computing National University of Singapore Aug 14, 2015 CS6204 Lecturer Chan Mun Choon Office: COM2, #04-17 Email: [email protected]
OTN, MPLS, and Control Plane Strategies
Global Service Provider Survey Excerpts: OTN, MPLS, and Control Plane Strategies By Andrew Schmitt Principal Analyst, Optical Infonetics Research SUMMARY: OTN SWITCHING POISED TO GO MAINSTREAM OTN switching
MPLS: Key Factors to Consider When Selecting Your MPLS Provider
White paper MPLS: Key Factors to Consider When Selecting Your MPLS Provider New Edge Networks June 2008 New Edge Networks 3000 Columbia House Blvd. Vancouver, WA 98661 360-693-9009 1-866-636-EDGE www.newedgenetworks.com
Multidimensional Game Theory Based Resource Allocation Scheme for Network Virtualization
Journal of Computational Information Systems 9: 9 (2013) 3431 3441 Available at http://www.jofcis.com Multidimensional Game Theory Based Resource Allocation Scheme for Network Virtualization Xiaochuan
Achieving High Quality Voiceover-IP Across WANs With Talari Networks APN Technology
Achieving High Quality Voiceover-IP Across WANs With Talari Networks APN Technology A Talari Networks Application Note 2012 Talari Networks / www.talari.com Enterprise-class Voice-over-IP Challenges In
A Deduplication-based Data Archiving System
2012 International Conference on Image, Vision and Computing (ICIVC 2012) IPCSIT vol. 50 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V50.20 A Deduplication-based Data Archiving System
A Fast Path Recovery Mechanism for MPLS Networks
A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.
symbiant Services Overview technologies Leading the way in flexible billing solutions
symbiant technologies Leading the way in flexible billing solutions Services Overview Symbiant Technologies is an industry-leading provider of bespoke billing systems and database software. Who we are
Experiment of network services invocation in the Orange testbed The CINA interface
Experiment of network services invocation in the Orange testbed The CINA interface Bertrand Mathieu, Irène Grosclaude, Pierre Paris Orange Labs [email protected] Workshop «Optimisation of Network
Public Key Infrastructure
UT DALLAS Erik Jonsson School of Engineering & Computer Science Public Key Infrastructure Murat Kantarcioglu What is PKI How to ensure the authenticity of public keys How can Alice be sure that Bob s purported
Pervasive PSQL Vx Server Licensing
Pervasive PSQL Vx Server Licensing Overview The Pervasive PSQL Vx Server edition is designed for highly virtualized environments with support for enterprise hypervisor features including live application
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
An Introduction to SIP
SIP trunking, simply put, is a way for you to accomplish something that you already do, for less money, with equal or better quality, and with greater functionality. A Guide to SIP V4 An Introduction to
Scalable Video Streaming in Wireless Mesh Networks for Education
Scalable Video Streaming in Wireless Mesh Networks for Education LIU Yan WANG Xinheng LIU Caixing 1. School of Engineering, Swansea University, Swansea, UK 2. College of Informatics, South China Agricultural
Making the Case for Satellite: Ensuring Business Continuity and Beyond. July 2008
Making the Case for Satellite: Ensuring Business Continuity and Beyond July 2008 Ensuring Business Continuity and Beyond Ensuring business continuity is a major concern of any company in today s technology
Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis
Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis Felipe Augusto Nunes de Oliveira - GRR20112021 João Victor Tozatti Risso - GRR20120726 Abstract. The increasing
Network Management System (NMS) FAQ
Network Management System (NMS) FAQ Q: How does the NMS work? A: The Cooper NMS is a powerful, flexible and highly scalable wireless and fixed network management solution for thousands of network nodes
WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider
WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream
Determine: route for each connection and protect them if necessary to minimize total network cost (say wavelength-links).
Service Provisioning to Provide Per-Connection-Based Availability Guarantee in WDM Mesh Networks Jing Zhang, Keyao Zhu, Hui Zang, and Biswanath Mukherjee Abstract We present availability analysis for WDM-mesh-network
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 Network Virtualization Overview... 1 Network Virtualization Key Requirements to be validated...
Recent Developments in Transport SDN
Recent Developments in Transport SDN JunJie Li OIF Representative China Telecom Layer 123 SDN & OpenFlow APAC Congress Singapore May 26-28, 2015 About the OIF The Optical Internetworking Forum: Represents
A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers
, pp.155-164 http://dx.doi.org/10.14257/ijunesst.2015.8.1.14 A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers Yunhua Gu, Bao Gao, Jin Wang, Mingshu Yin and Junyong Zhang
Voice and Data Convergence
Voice and Data Convergence Business Benefits and Deployment Strategy WHITEPAPER - MAY 2012 Data & Internet Voice & Mobile VOICE AND DATA COVERGENCE 2012 2 INTRODUCTION Over the past six years we have seen
RIVERBED STEELCENTRAL NETPLANNER
RIVERBED STEELCENTRAL NETPLANNER TESTIMONIALS IT Guru NetPlanner avoided the downtime of our critical applications by designing the network with resiliency to outages. Senior Network Architect Financial
Virtual Privacy vs. Real Security
Virtual Privacy vs. Real Security Certes Networks at a glance Leader in Multi-Layer Encryption Offices throughout North America, Asia and Europe Growing installed based with customers in 37 countries Developing
Two Approaches to Internet Traffic Engineering for End-to-End Quality of Service Provisioning
Two Approaches to Internet Engineering for End-to-End Quality of Service Provisioning Kin-Hon Ho, Michael Howarth, Ning Wang, George Pavlou and Stylianos Georgoulas Centre for Communication Systems Research,
Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks
Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,
Load Balanced Optical-Network-Unit (ONU) Placement Algorithm in Wireless-Optical Broadband Access Networks
Load Balanced Optical-Network-Unit (ONU Placement Algorithm in Wireless-Optical Broadband Access Networks Bing Li, Yejun Liu, and Lei Guo Abstract With the broadband services increasing, such as video
PHP FRAMEWORK FOR DATABASE MANAGEMENT BASED ON MVC PATTERN
PHP FRAMEWORK FOR DATABASE MANAGEMENT BASED ON MVC PATTERN Chanchai Supaartagorn Department of Mathematics Statistics and Computer, Faculty of Science, Ubon Ratchathani University, Thailand [email protected]
Network Virtualization
Network Virtualization Jennifer Rexford Advanced Computer Networks http://www.cs.princeton.edu/courses/archive/fall08/cos561/ Tuesdays/Thursdays 1:30pm-2:50pm Introduction Motivation for network virtualization
Master the Might of the Hybrid Cloud
Reach for the Sky Master the Might of the Hybrid Cloud WHITE PAPER As an IT decision maker at a global enterprise, you face unique challenges in managing a complex infrastructure with varied resources
Dynamic Network Resources Allocation in Grids through a Grid Network Resource Broker
INGRID 2007 Instrumenting the GRID Second International Workshop on Distributed Cooperative Laboratories Session 2: Networking for the GRID Dynamic Network Resources Allocation in Grids through a Grid
Datawire Secure Transport Value Proposition
Transport Value Proposition Contents: What is Transport? Transport is a patented connectivity service Datawire Defined that transports financial transactions securely and reliably over Datawire Value Proposition
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
SIP Signaling Router (SSR) Use Cases
APPLICATION GUIDE SIP Signaling Router (R) Use Cases Using SIP to improve network performance and deliver advanced services This application guide discusses how operators can use a SIP Signaling Router
Fast Reroute Techniques in MPLS Networks. George Swallow [email protected]
Fast Reroute Techniques in MPLS Networks George Swallow [email protected] Agenda What are your requirements? The solution space U-turns Traffic Engineering for LDP Traffic Engineering Some Observations
YOUR WHOLESALE PARTNER IN PORTUGAL
YOUR WHOLESALE PARTNER IN PORTUGAL WHO? A Portuguese telecommunications and Information technology provider focused mainly on the enterprise and government sectors. Retail Fiber network MPLS VoIP ICT AWS
Softwarization: RD & Innovation status of activities and next steps
Softwarization: RD & Innovation status of activities and next steps ANTONIO MANZALINI, Chair of the IEEE SDN initiative ITU-T Focus Group on IMT-2020 Pre-meeting workshop on network softwarization Turin,
voice Slash Voice Transmission Costs over IP and TDM Networks Compressed Voice System Vmux Product Family Innovative Access Solutions VS Compressed Voice over IP and TDM Networks In today s competitive
Control Plane architectures for Photonic Packet/Circuit Switching-based Large Scale Data Centres
Control Plane architectures for Photonic Packet/Circuit Switching-based Large Scale Data Centres Salvatore Spadaro Optical Communications group Universitat Politècnica de Catalunya (UPC) Barcelona, Spain
Wireless Mesh Networks and Applications in the Alarm Industry. A Technology Overview. Presented by
Wireless Mesh Networks and Applications in the Alarm Industry A Technology Overview Presented by Wireless Mesh Networks and Applications in the Alarm Industry Table of Contents Page 1.0 What is Wireless
Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow
International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter
Survivable Cloud Network Mapping for Disaster Recovery Support
IEEE TRANSACTIONS ON COMPUTERS 1 Survivable Cloud Network Mapping for Disaster Recovery Support F. Gu, N. Ghani, K. Shaban, S. Khan, M. Rahnamay-Naeini, M. M. Hayat, C. Assi Abstract Network virtualization
An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework
An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework Zutao Zhu Zhenjun Li YunYong Duan Department of Business Support Department of Computer Science Department of Business
Data Center is the Foundation of Carrier ICT Transformation. The challenges of building a service driven data center
P a g e 1 Data Center is the Foundation of Carrier ICT Transformation As we transform into the digital economy, the role of the Data Center has evolved from just being a container holding its individual
Network Design for Highly Available VoIP
Network Design for Highly Available VoIP David Tipper Associate Professor Department of Information Science and Telecommunications University of Pittsburgh [email protected] http://www.tele.pitt.edu/tipper.html
