Ultra-low latency (ULL) networks: The IEEE TSN and IETF DetNet standards and related 5G ULL research

A Nasrallah, AS Thyagaturu, Z Alharbi… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Many network applications, eg, industrial control, demand ultra-low latency (ULL). However,
traditional packet networks can only reduce the end-to-end latencies to the order of tens of …

Joint optimization of chain placement and request scheduling for network function virtualization

Q Zhang, Y Xiao, F Liu, JCS Lui, J Guo… - 2017 IEEE 37th …, 2017 - ieeexplore.ieee.org
Compared with executing Network Functions (NFs) on dedicated hardwares, the recent
trend of Network Function Virtualization (NFV) holds the promise for operators to flexibly …

An efficient online algorithm for dynamic SDN controller assignment in data center networks

T Wang, F Liu, H Xu - IEEE/ACM Transactions on Networking, 2017 - ieeexplore.ieee.org
Software defined networking is increasingly prevalent in data center networks for it enables
centralized network configuration and management. However, since switches are statically …

[PDF][PDF] Ultra-low latency (ULL) networks: A comprehensive survey covering the IEEE TSN standard and related ULL research

A Nasrallah, A Thyagaturu, Z Alharbi… - arXiv preprint arXiv …, 2018 - researchgate.net
Many network applications, eg, industrial control, demand Ultra-Low Latency (ULL).
However, traditional packet networks can only reduce the end-to-end latencies to the order …

CMD: co-analyzed iot malware detection and forensics via network and hardware domains

Z Zhao, Z Li, J Yu, F Zhang, X Xie… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the widespread use of Internet of Things (IoT) devices, malware detection has become
a hot spot for both academic and industrial communities. Existing approaches can be …

Effective DDoS mitigation via ML-driven in-network traffic shaping

Z Zhao, Z Liu, H Chen, F Zhang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Defending against Distributed Denial of Service (DDoS) attacks is a fundamental problem in
the Internet. Over the past few decades, the research and industry communities have …

Flash: Joint Flow Scheduling and Congestion Control in Data Center Networks

C Gao, S Chu, H Xu, M Xu, K Ye… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Flow scheduling and congestion control are two important techniques to reduce flow
completion time in data center networks. While existing works largely treat them …

Toward a flexible design of SDN dynamic control plane: An online optimization approach

M He, A Varasteh, W Kellerer - IEEE Transactions on Network …, 2019 - ieeexplore.ieee.org
With a centralized control over the forwarding devices and the embedded flows, Software
Defined Networking promises to increase the flexibility of communication networks …

TeaVisor: network hypervisor for bandwidth isolation in SDN-NV

Y Yoo, G Yang, J Lee, C Shin, H Kim… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
We introduce TeaVisor that provides bandwidth isolation guarantee for network virtualization
(NV) based on software-defined networking (SDN). SDN-based NV (SDN-NV) offers many …

SDNManager: A safeguard architecture for SDN DoS attacks based on bandwidth prediction

T Wang, H Chen, G Cheng, Y Lu - Security and Communication …, 2018 - Wiley Online Library
Software‐Defined Networking (SDN) has quickly emerged as a promising technology for
future networks and gained much attention. However, the centralized nature of SDN makes …