Post-Disaster Technologies in Network Virtualization. Chen Ma Group Meeting August, 28, 2015

Size: px
Start display at page:

Download "Post-Disaster Technologies in Network Virtualization. Chen Ma Group Meeting August, 28, 2015"

Transcription

1 Post-Disaster Technologies in Network Virtualization Chen Ma Group Meeting August, 28, 2015

2 Outlines 1 Review of Post-Disaster Technologies 2 (Open Problem 1) Multiple Traveling Repairmen Problem with Reprovisioning 3 (Open Problem 2) Virtual Network Degradation Post-Disaster Technologies in Network Virtualization, Chen Ma Page 2

3 References 1. N. M. Mosharaf Kabir Chowdhurry, and Raouf Boutaba, Network Virtualization: State of the Art and Research Challenges, Communication Magazine, Kenichi Mase, How to Deliver Your Message from/to a Disaster Area, Communication Magazine, S. S. Savas, et al., Network Adaptability to Disaster Disruptions by Exploiting Degraded-Service Tolerance, Communication Magazine, N. H. Bao, et al., Global Versus Essential Post-Disaster Re-Provisioning in Telecom Mesh Networks, JOCN, A. Basta, I. B. Barla, M. Hoffmann, G. Carles, and D. A. Schupke, Failure Coverage in Optimal Virtual Networks, OFC, C. C. Meixner, et al. Cloud-Network Disaster Recovery Against Cascading Failures, Globecom Kenichi Mase, How to Deliver Your Message from/to a Disaster Area, Communication Magazine, Mahsa Pourvali, Kaile Liang, Feng Gu, Hao Bai, Khaled Shaban, Samee Khan, Nasir Ghani, Progressive Recovery For Network Virtualization After Large-Scale Disasters, ICNC 2016 (reviewed) Post-Disaster Technologies in Network Virtualization, Chen Ma Page 3

4 Background In recently years, the concept of network virtualization has attracted significant attention in both industry and academia [1]. Network virtualization is defined by decoupling the roles of the traditional Internet service providers (ISPs) into two independent entities: infrastructure providers (InPs), who manage the physical infrastructure, and service providers (SPs), who create virtual networks (VNs) by aggregating resources from multiple InPs and offer end-to-end services [1]. In the USA, Crown Castle and American Tower Corporation are the largest infrastructure providers for telecommunication. AT&T sold 9,700 wireless towers to Crown Castle in 2013, which means AT&T focus on providing service to end users [2]. In China, China Tower Corporation was established in And China Mobile, China Union, China Telecom separate their towers and basic infrastructures to China Tower [3]. Post-Disaster Technologies in Network Virtualization, Chen Ma Page 4

5 Business Model Infrastructure provider (InP): InPs deploy and actually manage the underlying physical network resources. They offer their resources through programmable interfaces to different SPs. Service provider (SP): SPs lease resources from multiple InPs to create and deploy VNs by programming allocated network resources to offer end-to-end services to end users. An SP can also provide network services to other SPs. End user: End users in the network virtualization are similar to those of the existing Internet. Post-Disaster Technologies in Network Virtualization, Chen Ma Page 5

6 Survivability of Network Virtualization Virtual Node Virtual Link Virtual Network Capacity of computing, storing, transportation, et.al. It may be out of work after the disaster. Transportation capacity. It may be disconnected after the disaster. It is composed of virtual links and nodes. And it may be disconnected after the disaster. End to end connection Affect to a connection path. Node cannot be replaced Virtual networks 1. Affect to virtual links/nodes. 2. Affect to virtual networks. Virtual node can be replaced. Such as virtual node migration. Post-Disaster Technologies in Network Virtualization, Chen Ma Page 6

7 Post-Disaster Technologies Protection [7] Reprovisioning [5,6,8] Emergence Communication [9] Repair [10] ms, preconfigured before disaster Temporary Traffic Engenerring minutes~hours, after disaster Temporary Traffic Engineering hours~days, after disaster Temporary Network Engineering Change the physical topology. hours~weeks, after disaster Permanent Network Engineering Post-Disaster Technologies in Network Virtualization, Chen Ma Page 7

8 Outlines 1 Review of Post-Disaster Technologies 2 (Open Problem 1) Multiple Traveling Repairmen Problem with Reprovisioning 3 (Open Problem 2) Virtual Network Degradation Post-Disaster Technologies in Network Virtualization, Chen Ma Page 8

9 Problem Statement Post-Disaster Technologies in Network Virtualization, Chen Ma Page 9

10 Recovery without Reprovisioning Number of FVL r 1 r 2 r b 1 b 2 f 14 f 7 f 2 f 1 f 10 b 3 f 11 f 8 f 5 f 4 f 15 D FVL =5.76*8+7.29*6 f 2 -i 2 k 3 -l 3 t 3 t 4 t 7 t 10 t (h) Repair Time f f 9 f 12 f 13 n 4 -k 4 f 4 -n 4 i 2 -k 2 t 12 t 13 t 14 f 3 q 3 -o 3 h 1 -m 1 h 4 -n *4+1.63*2 = Post-Disaster Technologies in Network Virtualization, Chen Ma Page 10

11 Recovery with Reprovisioning Post-Disaster Technologies in Network Virtualization, Chen Ma Page 11

12 Recovery with Reprovisioning Number of FVL r 1 r 2 r b 1 b 2 b 3 f 14 f 7 f 2 f 11 h 1 -m 1 k 2 -m 2 m 2 -q 2 k 3 -m 3 m 3 -q 3 f 1 f 10 f 8 f 5 f 4 t 3 t 4 t 7 t 10 t (h) Repair Time f f 9 f 12 f 13 n 4 -k 4 f 4 -n 4 h 4 -n 4 t 12 t 13 t 14 f 15 f 3 D FVL =4.32*8+8.73*3 =60.75 Post-Disaster Technologies in Network Virtualization, Chen Ma Page 12

13 Two Problems of MTRPR How to find a repair schedule? How to figure out the damage of a schedule? Post-Disaster Technologies in Network Virtualization, Chen Ma Page 13

14 How to figure out the damage of a schedule. Given: A repair schedule. Output: Damage caused by the FVL and DVN in the schedule. Recovery with Reprovisioning Begin Recovery without Reprovisioning Begin All FPLs are repaired? End Yes No Reprovisioning Repair All FPLs are repaired? End Yes No Repair Post-Disaster Technologies in Network Virtualization, Chen Ma Page 14

15 How to find a repair schedule. Genetic Algorithm Repair Schedule Multiple Chromosomes Post-Disaster Technologies in Network Virtualization, Chen Ma Page 15

16 Genetic Operators Internal-route operator External-route operator Internal-route inversion Internal-route transposition External-route transposition Post-Disaster Technologies in Network Virtualization, Chen Ma Page 16

17 Process of GA Operate to a new new with C new Begin If new is accepted Yes new Initialize set of schedule S=null No If continuous K new are not accepted No Initialize schedule with damage C Yes Find the with minimum damage C in S End Post-Disaster Technologies in Network Virtualization, Chen Ma Page 17

18 Outlines 1 Review of Post-Disaster Technologies 2 (Open Problem 1) Multiple Traveling Repairmen Problem with Reprovisioning 3 (Open Problem 2) Virtual Network Degradation Post-Disaster Technologies in Network Virtualization, Chen Ma Page 18

19 Virtual Network Degradation (VND) After a disaster occurs, which virtual network should be degraded? what we can do to degrade the virtual networks? which is different with the degradation in end to end connection? May be the answer: In the schedule, network operators can select minimum the number of degraded virtual networks as the objective. (1) Degrade the capacity of virtual links. (2) Delete several virtual links of a degraded virtual network. Network operators should consider the connectivity of virtual networks. Post-Disaster Technologies in Network Virtualization, Chen Ma Page 19

20 Thanks! Biswanath Mukherjee Charles U Martel Massimo Tornatore Everyone! 谢 谢! Post-Disaster Technologies in Network Virtualization, Chen Ma Page 20

INTRODUCTION TO NETWORK VIRTUALIZATION

INTRODUCTION TO NETWORK VIRTUALIZATION 1 INTRODUCTION TO NETWORK VIRTUALIZATION Wednesday, May 14, 2008 Mosharaf Chowdhury Member, envy Project What is Virtualization? 2 Transparent abstraction of computing platform and resources Multiple logical

More information

Network Virtualization: A Tutorial

Network Virtualization: A Tutorial Network Virtualization: A Tutorial George N. Rouskas Department of Computer Science North Carolina State University http://rouskas.csc.ncsu.edu/ Network Virtualization: A Tutorial OFC 2012, March 2012

More information

White Paper. Requirements of Network Virtualization

White Paper. Requirements of Network Virtualization White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction

More information

Progressive Recovery For Network Virtualization After Large-Scale Disasters

Progressive Recovery For Network Virtualization After Large-Scale Disasters 1 Progressive Recover For Network Virtualization After Large-Scale Disasters Mahsa Pourvali 1, Kaile Liang 2, Feng Gu 3, Hao Bai 1, Khaled Shaban 4, Samee Khan 5, Nasir Ghani 1 1 Universit of South Florida,

More information

Network Virtualization issues on Market Oriented. Eui-Nam Huh

Network Virtualization issues on Market Oriented. Eui-Nam Huh Network Virtualization issues on Market Oriented Cloud Computing Presented By Eui-Nam Huh Kyung Hee University Contents Introduction ti of Network Virtualization ti Related Projects Research Direction

More information

Disaster-Resilient Virtual-Network Mapping and Adaptation in Optical Networks

Disaster-Resilient Virtual-Network Mapping and Adaptation in Optical Networks Disaster-Resilient Virtual-Network Mapping and Adaptation in Optical Networks Carlos Colman Meixner, Ferhat Dikiyik, Massimo Tornatore, Chen-Nee Chuah, and Biswanath Mukherjee University of California,

More information

Disaster-Resilient Backbone and Access Networks

Disaster-Resilient Backbone and Access Networks The Workshop on Establishing Resilient Life-Space in the Cyber-Physical Integrated Society, March. 17, 2015, Sendai, Japan Disaster-Resilient Backbone and Access Networks Shigeki Yamada ([email protected])

More information

Business Case for Cisco SDN for the WAN

Business Case for Cisco SDN for the WAN Business Case for Cisco SDN for the WAN s Executive Summary Traffic requirements are growing rapidly because of the widespread acceptance of online video services, cloud computing, and mobile broadband.

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]

More information

Intelligent Load Balancing: Overflow Balance

Intelligent Load Balancing: Overflow Balance More Bandwidth. More Reliability. More Survivability Intelligent Load Balancing: Overflow Balance Application Note Understanding Outbound Balance Routing The BODi delivers a simple, cost effective way

More information

White Paper on NETWORK VIRTUALIZATION

White Paper on NETWORK VIRTUALIZATION White Paper on NETWORK VIRTUALIZATION INDEX 1. Introduction 2. Key features of Network Virtualization 3. Benefits of Network Virtualization 4. Architecture of Network Virtualization 5. Implementation Examples

More information

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of

More information

FAQ: BroadLink Multi-homing Load Balancers

FAQ: BroadLink Multi-homing Load Balancers FAQ: BroadLink Multi-homing Load Balancers BroadLink Overview Outbound Traffic Inbound Traffic Bandwidth Management Persistent Routing High Availability BroadLink Overview 1. What is BroadLink? BroadLink

More information

Resilience in Networks: Elements and Approach for a Trustworthy Infrastructure. Andreas Fischer and Hermann de Meer

Resilience in Networks: Elements and Approach for a Trustworthy Infrastructure. Andreas Fischer and Hermann de Meer Resilience in Networks: Elements and Approach for a Trustworthy Infrastructure Andreas Fischer and Hermann de Meer The ResumeNet project Resilience & Survivability for future networking framework, mechanisms

More information

Network Virtualization: State of the Art and Research Challenges

Network Virtualization: State of the Art and Research Challenges 1 Network Virtualization: State of the Art and Research Challenges N.M. Mosharaf Kabir Chowdhury and Raouf Boutaba, University of Waterloo Abstract Recently network virtualization has been pushed forward

More information

Virtual Network Provisioning and Fault-Management across Multiple Domains

Virtual Network Provisioning and Fault-Management across Multiple Domains Virtual Network Provisioning and Fault-Management across Multiple Domains Distinguished Speaker Series Democritus University of Thrace, Greece Panagiotis Papadimitriou November 2010 Introduction The Internet

More information

Evolution of telecom network infrastructure for broadcast and interactive applications

Evolution of telecom network infrastructure for broadcast and interactive applications Evolution of telecom network infrastructure for broadcast and interactive applications Fabio Tassara Business Development Director Alcatel-Lucent Optics Networks 2007 To IP and beyond! European Broadcasting

More information

How To Understand The Power Of Icdn

How To Understand The Power Of Icdn MobiArch 2014 R-iCDN: an Approach Supporting Flexible Content Routing for ISP-operated CDN Song Ci High Performance Network Lab, Institute of Acoustics, Chinese Academy of Sciences Outline I. Background

More information

Wireless Video Best Practices Guide

Wireless Video Best Practices Guide Wireless Video Best Practices Guide Using Digital Video Manager (DVM) with the OneWireless Universal Mesh Network Authors: Annemarie Diepenbroek DVM Product Manager Soroush Amidi OneWireless Product Manager

More information

A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks

A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashhad, Mashhad, Iran [email protected]

More information

The 700 MHz Band. Impact of the UHF spectrum reallocation on TV markets in Europe. 38 th EPRA meeting, Vilnius, October 2013

The 700 MHz Band. Impact of the UHF spectrum reallocation on TV markets in Europe. 38 th EPRA meeting, Vilnius, October 2013 38 th EPRA meeting, Vilnius, October 2013 The 700 MHz Band Impact of the UHF spectrum reallocation on TV markets in Europe Darko Ratkaj European Broadcasting Union FOUR WAYS TO RECEIVE TV SERVICES Terrestrial

More information

Virtual Network Services As Enabler of Dynamic Application-Aware Traffic Engineering Masato Tsuru

Virtual Network Services As Enabler of Dynamic Application-Aware Traffic Engineering Masato Tsuru Virtual Network Services As Enabler of Dynamic Application-Aware Traffic Engineering Masato Tsuru Network Design Research Center, Kyushu Institute of Technology, Japan Ultimate Goal (or Problems already

More information

Mobile Broadband Technology & Services: Sustainability Factors

Mobile Broadband Technology & Services: Sustainability Factors Mobile Broadband Technology & Services: Sustainability Factors Fisseha Mekuria (PhD.) CSIR Modelling and Digital Sciences, Mobile Computing Platforms. Pretoria 0001, South Africa. [email protected] Abstract:

More information

Wireless Clinical Monitoring @ Scale!

Wireless Clinical Monitoring @ Scale! Wireless Clinical Monitoring @ Scale! Chenyang Lu! Cyber-Physical Systems Laboratory! Department of Computer Science and Engineering! Motivation!! Clinical deterioration in hospitalized patients! " 4-17%

More information

Network Architecture and Topology

Network Architecture and Topology 1. Introduction 2. Fundamentals and design principles 3. Network architecture and topology 4. Network control and signalling 5. Network components 5.1 links 5.2 switches and routers 6. End systems 7. End-to-end

More information

Records management in SharePoint 2010

Records management in SharePoint 2010 Records management in SharePoint 2010 Implications and issues Crown copyright 2011 You may re-use this information (excluding logos) free of charge in any format or medium, under the terms of the Open

More information

SURVEY ON GREEN CLOUD COMPUTING DATA CENTERS

SURVEY ON GREEN CLOUD COMPUTING DATA CENTERS SURVEY ON GREEN CLOUD COMPUTING DATA CENTERS ¹ONKAR ASWALE, ²YAHSAVANT JADHAV, ³PAYAL KALE, 4 NISHA TIWATANE 1,2,3,4 Dept. of Computer Sci. & Engg, Rajarambapu Institute of Technology, Islampur Abstract-

More information

A Network Management Software Based on Secure Shell (SSH) Channels. and Java Universal Network Graph (JUNG)

A Network Management Software Based on Secure Shell (SSH) Channels. and Java Universal Network Graph (JUNG) A Network Management Software Based on Secure Shell (SSH) Channels and Java Universal Network Graph (JUNG) Students: Simran Khalsa, Gerald Castaneda, Ruben Rivera. Mentor: Dr. Jorge Crichigno Department

More information

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations

More information

The Analysis and Simulation of VoIP

The Analysis and Simulation of VoIP ENSC 427 Communication Networks Spring 2013 Final Project The Analysis and Simulation of VoIP http://www.sfu.ca/~cjw11/427project.html Group #3 Demet Dilekci [email protected] Conrad Wang [email protected] Jiang

More information

1+1: Protected Microwave Links

1+1: Protected Microwave Links 1+1: Protected Microwave Links Abstract This paper deals with the methods of increasing the uptime of a single microwave link. Setting up a fully protected radio link implies network element redundancy.

More information

CS6204 Advanced Topics in Networking

CS6204 Advanced Topics in Networking CS6204 Advanced Topics in Networking Assoc Prof. Chan Mun Choon School of Computing National University of Singapore Aug 14, 2015 CS6204 Lecturer Chan Mun Choon Office: COM2, #04-17 Email: [email protected]

More information

OTN, MPLS, and Control Plane Strategies

OTN, MPLS, and Control Plane Strategies Global Service Provider Survey Excerpts: OTN, MPLS, and Control Plane Strategies By Andrew Schmitt Principal Analyst, Optical Infonetics Research SUMMARY: OTN SWITCHING POISED TO GO MAINSTREAM OTN switching

More information

MPLS: Key Factors to Consider When Selecting Your MPLS Provider

MPLS: Key Factors to Consider When Selecting Your MPLS Provider White paper MPLS: Key Factors to Consider When Selecting Your MPLS Provider New Edge Networks June 2008 New Edge Networks 3000 Columbia House Blvd. Vancouver, WA 98661 360-693-9009 1-866-636-EDGE www.newedgenetworks.com

More information

Multidimensional Game Theory Based Resource Allocation Scheme for Network Virtualization

Multidimensional Game Theory Based Resource Allocation Scheme for Network Virtualization Journal of Computational Information Systems 9: 9 (2013) 3431 3441 Available at http://www.jofcis.com Multidimensional Game Theory Based Resource Allocation Scheme for Network Virtualization Xiaochuan

More information

Achieving High Quality Voiceover-IP Across WANs With Talari Networks APN Technology

Achieving High Quality Voiceover-IP Across WANs With Talari Networks APN Technology Achieving High Quality Voiceover-IP Across WANs With Talari Networks APN Technology A Talari Networks Application Note 2012 Talari Networks / www.talari.com Enterprise-class Voice-over-IP Challenges In

More information

A Deduplication-based Data Archiving System

A Deduplication-based Data Archiving System 2012 International Conference on Image, Vision and Computing (ICIVC 2012) IPCSIT vol. 50 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V50.20 A Deduplication-based Data Archiving System

More information

A Fast Path Recovery Mechanism for MPLS Networks

A Fast Path Recovery Mechanism for MPLS Networks A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.

More information

symbiant Services Overview technologies Leading the way in flexible billing solutions

symbiant Services Overview technologies Leading the way in flexible billing solutions symbiant technologies Leading the way in flexible billing solutions Services Overview Symbiant Technologies is an industry-leading provider of bespoke billing systems and database software. Who we are

More information

Experiment of network services invocation in the Orange testbed The CINA interface

Experiment of network services invocation in the Orange testbed The CINA interface Experiment of network services invocation in the Orange testbed The CINA interface Bertrand Mathieu, Irène Grosclaude, Pierre Paris Orange Labs [email protected] Workshop «Optimisation of Network

More information

Public Key Infrastructure

Public Key Infrastructure UT DALLAS Erik Jonsson School of Engineering & Computer Science Public Key Infrastructure Murat Kantarcioglu What is PKI How to ensure the authenticity of public keys How can Alice be sure that Bob s purported

More information

Pervasive PSQL Vx Server Licensing

Pervasive PSQL Vx Server Licensing Pervasive PSQL Vx Server Licensing Overview The Pervasive PSQL Vx Server edition is designed for highly virtualized environments with support for enterprise hypervisor features including live application

More information

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra

More information

An Introduction to SIP

An Introduction to SIP SIP trunking, simply put, is a way for you to accomplish something that you already do, for less money, with equal or better quality, and with greater functionality. A Guide to SIP V4 An Introduction to

More information

Scalable Video Streaming in Wireless Mesh Networks for Education

Scalable Video Streaming in Wireless Mesh Networks for Education Scalable Video Streaming in Wireless Mesh Networks for Education LIU Yan WANG Xinheng LIU Caixing 1. School of Engineering, Swansea University, Swansea, UK 2. College of Informatics, South China Agricultural

More information

Making the Case for Satellite: Ensuring Business Continuity and Beyond. July 2008

Making the Case for Satellite: Ensuring Business Continuity and Beyond. July 2008 Making the Case for Satellite: Ensuring Business Continuity and Beyond July 2008 Ensuring Business Continuity and Beyond Ensuring business continuity is a major concern of any company in today s technology

More information

Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis

Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis Felipe Augusto Nunes de Oliveira - GRR20112021 João Victor Tozatti Risso - GRR20120726 Abstract. The increasing

More information

Network Management System (NMS) FAQ

Network Management System (NMS) FAQ Network Management System (NMS) FAQ Q: How does the NMS work? A: The Cooper NMS is a powerful, flexible and highly scalable wireless and fixed network management solution for thousands of network nodes

More information

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream

More information

Determine: route for each connection and protect them if necessary to minimize total network cost (say wavelength-links).

Determine: route for each connection and protect them if necessary to minimize total network cost (say wavelength-links). Service Provisioning to Provide Per-Connection-Based Availability Guarantee in WDM Mesh Networks Jing Zhang, Keyao Zhu, Hui Zang, and Biswanath Mukherjee Abstract We present availability analysis for WDM-mesh-network

More information

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 Network Virtualization Overview... 1 Network Virtualization Key Requirements to be validated...

More information

Recent Developments in Transport SDN

Recent Developments in Transport SDN Recent Developments in Transport SDN JunJie Li OIF Representative China Telecom Layer 123 SDN & OpenFlow APAC Congress Singapore May 26-28, 2015 About the OIF The Optical Internetworking Forum: Represents

More information

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers , pp.155-164 http://dx.doi.org/10.14257/ijunesst.2015.8.1.14 A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers Yunhua Gu, Bao Gao, Jin Wang, Mingshu Yin and Junyong Zhang

More information

Voice and Data Convergence

Voice and Data Convergence Voice and Data Convergence Business Benefits and Deployment Strategy WHITEPAPER - MAY 2012 Data & Internet Voice & Mobile VOICE AND DATA COVERGENCE 2012 2 INTRODUCTION Over the past six years we have seen

More information

RIVERBED STEELCENTRAL NETPLANNER

RIVERBED STEELCENTRAL NETPLANNER RIVERBED STEELCENTRAL NETPLANNER TESTIMONIALS IT Guru NetPlanner avoided the downtime of our critical applications by designing the network with resiliency to outages. Senior Network Architect Financial

More information

Virtual Privacy vs. Real Security

Virtual Privacy vs. Real Security Virtual Privacy vs. Real Security Certes Networks at a glance Leader in Multi-Layer Encryption Offices throughout North America, Asia and Europe Growing installed based with customers in 37 countries Developing

More information

Two Approaches to Internet Traffic Engineering for End-to-End Quality of Service Provisioning

Two Approaches to Internet Traffic Engineering for End-to-End Quality of Service Provisioning Two Approaches to Internet Engineering for End-to-End Quality of Service Provisioning Kin-Hon Ho, Michael Howarth, Ning Wang, George Pavlou and Stylianos Georgoulas Centre for Communication Systems Research,

More information

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,

More information

Load Balanced Optical-Network-Unit (ONU) Placement Algorithm in Wireless-Optical Broadband Access Networks

Load Balanced Optical-Network-Unit (ONU) Placement Algorithm in Wireless-Optical Broadband Access Networks Load Balanced Optical-Network-Unit (ONU Placement Algorithm in Wireless-Optical Broadband Access Networks Bing Li, Yejun Liu, and Lei Guo Abstract With the broadband services increasing, such as video

More information

PHP FRAMEWORK FOR DATABASE MANAGEMENT BASED ON MVC PATTERN

PHP FRAMEWORK FOR DATABASE MANAGEMENT BASED ON MVC PATTERN PHP FRAMEWORK FOR DATABASE MANAGEMENT BASED ON MVC PATTERN Chanchai Supaartagorn Department of Mathematics Statistics and Computer, Faculty of Science, Ubon Ratchathani University, Thailand [email protected]

More information

Network Virtualization

Network Virtualization Network Virtualization Jennifer Rexford Advanced Computer Networks http://www.cs.princeton.edu/courses/archive/fall08/cos561/ Tuesdays/Thursdays 1:30pm-2:50pm Introduction Motivation for network virtualization

More information

Master the Might of the Hybrid Cloud

Master the Might of the Hybrid Cloud Reach for the Sky Master the Might of the Hybrid Cloud WHITE PAPER As an IT decision maker at a global enterprise, you face unique challenges in managing a complex infrastructure with varied resources

More information

Dynamic Network Resources Allocation in Grids through a Grid Network Resource Broker

Dynamic Network Resources Allocation in Grids through a Grid Network Resource Broker INGRID 2007 Instrumenting the GRID Second International Workshop on Distributed Cooperative Laboratories Session 2: Networking for the GRID Dynamic Network Resources Allocation in Grids through a Grid

More information

Datawire Secure Transport Value Proposition

Datawire Secure Transport Value Proposition Transport Value Proposition Contents: What is Transport? Transport is a patented connectivity service Datawire Defined that transports financial transactions securely and reliably over Datawire Value Proposition

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information

SIP Signaling Router (SSR) Use Cases

SIP Signaling Router (SSR) Use Cases APPLICATION GUIDE SIP Signaling Router (R) Use Cases Using SIP to improve network performance and deliver advanced services This application guide discusses how operators can use a SIP Signaling Router

More information

Fast Reroute Techniques in MPLS Networks. George Swallow [email protected]

Fast Reroute Techniques in MPLS Networks. George Swallow swallow@cisco.com Fast Reroute Techniques in MPLS Networks George Swallow [email protected] Agenda What are your requirements? The solution space U-turns Traffic Engineering for LDP Traffic Engineering Some Observations

More information

YOUR WHOLESALE PARTNER IN PORTUGAL

YOUR WHOLESALE PARTNER IN PORTUGAL YOUR WHOLESALE PARTNER IN PORTUGAL WHO? A Portuguese telecommunications and Information technology provider focused mainly on the enterprise and government sectors. Retail Fiber network MPLS VoIP ICT AWS

More information

Softwarization: RD & Innovation status of activities and next steps

Softwarization: RD & Innovation status of activities and next steps Softwarization: RD & Innovation status of activities and next steps ANTONIO MANZALINI, Chair of the IEEE SDN initiative ITU-T Focus Group on IMT-2020 Pre-meeting workshop on network softwarization Turin,

More information

voice Slash Voice Transmission Costs over IP and TDM Networks Compressed Voice System Vmux Product Family Innovative Access Solutions VS Compressed Voice over IP and TDM Networks In today s competitive

More information

Control Plane architectures for Photonic Packet/Circuit Switching-based Large Scale Data Centres

Control Plane architectures for Photonic Packet/Circuit Switching-based Large Scale Data Centres Control Plane architectures for Photonic Packet/Circuit Switching-based Large Scale Data Centres Salvatore Spadaro Optical Communications group Universitat Politècnica de Catalunya (UPC) Barcelona, Spain

More information

Wireless Mesh Networks and Applications in the Alarm Industry. A Technology Overview. Presented by

Wireless Mesh Networks and Applications in the Alarm Industry. A Technology Overview. Presented by Wireless Mesh Networks and Applications in the Alarm Industry A Technology Overview Presented by Wireless Mesh Networks and Applications in the Alarm Industry Table of Contents Page 1.0 What is Wireless

More information

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter

More information

Survivable Cloud Network Mapping for Disaster Recovery Support

Survivable Cloud Network Mapping for Disaster Recovery Support IEEE TRANSACTIONS ON COMPUTERS 1 Survivable Cloud Network Mapping for Disaster Recovery Support F. Gu, N. Ghani, K. Shaban, S. Khan, M. Rahnamay-Naeini, M. M. Hayat, C. Assi Abstract Network virtualization

More information

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework Zutao Zhu Zhenjun Li YunYong Duan Department of Business Support Department of Computer Science Department of Business

More information

Data Center is the Foundation of Carrier ICT Transformation. The challenges of building a service driven data center

Data Center is the Foundation of Carrier ICT Transformation. The challenges of building a service driven data center P a g e 1 Data Center is the Foundation of Carrier ICT Transformation As we transform into the digital economy, the role of the Data Center has evolved from just being a container holding its individual

More information

Network Design for Highly Available VoIP

Network Design for Highly Available VoIP Network Design for Highly Available VoIP David Tipper Associate Professor Department of Information Science and Telecommunications University of Pittsburgh [email protected] http://www.tele.pitt.edu/tipper.html

More information