Ultra-low latency (ULL) networks: The IEEE TSN and IETF DetNet standards and related 5G ULL research
A Nasrallah, AS Thyagaturu, Z Alharbi… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Many network applications, eg, industrial control, demand ultra-low latency (ULL). However,
traditional packet networks can only reduce the end-to-end latencies to the order of tens of …
traditional packet networks can only reduce the end-to-end latencies to the order of tens of …
Joint optimization of chain placement and request scheduling for network function virtualization
Compared with executing Network Functions (NFs) on dedicated hardwares, the recent
trend of Network Function Virtualization (NFV) holds the promise for operators to flexibly …
trend of Network Function Virtualization (NFV) holds the promise for operators to flexibly …
An efficient online algorithm for dynamic SDN controller assignment in data center networks
Software defined networking is increasingly prevalent in data center networks for it enables
centralized network configuration and management. However, since switches are statically …
centralized network configuration and management. However, since switches are statically …
[PDF][PDF] Ultra-low latency (ULL) networks: A comprehensive survey covering the IEEE TSN standard and related ULL research
A Nasrallah, A Thyagaturu, Z Alharbi… - arXiv preprint arXiv …, 2018 - researchgate.net
Many network applications, eg, industrial control, demand Ultra-Low Latency (ULL).
However, traditional packet networks can only reduce the end-to-end latencies to the order …
However, traditional packet networks can only reduce the end-to-end latencies to the order …
CMD: co-analyzed iot malware detection and forensics via network and hardware domains
With the widespread use of Internet of Things (IoT) devices, malware detection has become
a hot spot for both academic and industrial communities. Existing approaches can be …
a hot spot for both academic and industrial communities. Existing approaches can be …
Effective DDoS mitigation via ML-driven in-network traffic shaping
Defending against Distributed Denial of Service (DDoS) attacks is a fundamental problem in
the Internet. Over the past few decades, the research and industry communities have …
the Internet. Over the past few decades, the research and industry communities have …
Flash: Joint Flow Scheduling and Congestion Control in Data Center Networks
Flow scheduling and congestion control are two important techniques to reduce flow
completion time in data center networks. While existing works largely treat them …
completion time in data center networks. While existing works largely treat them …
Toward a flexible design of SDN dynamic control plane: An online optimization approach
With a centralized control over the forwarding devices and the embedded flows, Software
Defined Networking promises to increase the flexibility of communication networks …
Defined Networking promises to increase the flexibility of communication networks …
TeaVisor: network hypervisor for bandwidth isolation in SDN-NV
We introduce TeaVisor that provides bandwidth isolation guarantee for network virtualization
(NV) based on software-defined networking (SDN). SDN-based NV (SDN-NV) offers many …
(NV) based on software-defined networking (SDN). SDN-based NV (SDN-NV) offers many …
SDNManager: A safeguard architecture for SDN DoS attacks based on bandwidth prediction
T Wang, H Chen, G Cheng, Y Lu - Security and Communication …, 2018 - Wiley Online Library
Software‐Defined Networking (SDN) has quickly emerged as a promising technology for
future networks and gained much attention. However, the centralized nature of SDN makes …
future networks and gained much attention. However, the centralized nature of SDN makes …