Academic literature on the topic 'VSwitch'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'VSwitch.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "VSwitch"

1

Sans, Francisco, and Eric Gamess. "Analytical Performance Evaluation of Different Switch Solutions." Journal of Computer Networks and Communications 2013 (2013): 1–11. http://dx.doi.org/10.1155/2013/953797.

Full text
Abstract:
The virtualization of the network access layer has opened new doors in how we perceive networks. With this virtualization of the network, it is possible to transform a regular PC with several network interface cards into a switch. PC-based switches are becoming an alternative to off-the-shelf switches, since they are cheaper. For this reason, it is important to evaluate the performance of PC-based switches. In this paper, we present a performance evaluation of two PC-based switches, using Open vSwitch and LiSA, and compare their performance with an off-the-shelf Cisco switch. The RTT, throughput, and fairness for UDP are measured for both Ethernet and Fast Ethernet technologies. From this research, we can conclude that the Cisco switch presents the best performance, and both PC-based switches have similar performance. Between Open vSwitch and LiSA, Open vSwitch represents a better choice since it has more features and is currently actively developed.
APA, Harvard, Vancouver, ISO, and other styles
2

Tu, Cheng-Chun, Joe Stringer, and Justin Pettit. "Building an Extensible Open vSwitch Datapath." ACM SIGOPS Operating Systems Review 51, no. 1 (September 11, 2017): 72–77. http://dx.doi.org/10.1145/3139645.3139657.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Akkoc, Mertkan, and Berk Canberk. "Interval Partitioning for Packet Classification in OpenFlow vSwitch." IEEE Networking Letters 2, no. 3 (September 2020): 128–31. http://dx.doi.org/10.1109/lnet.2020.3007570.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Effendi, Mufid Ridlo, Eki Ahmad Zaki Hamidi, and Andriansyah Saepulloh. "Implementasi GRE Tunneling Menggunakan Open vSwitch Pada Jaringan Kampus." TELKA - Telekomunikasi, Elektronika, Komputasi dan Kontrol 3, no. 2 (November 11, 2017): 103–11. http://dx.doi.org/10.15575/telka.v3i2.62.

Full text
Abstract:
Perkembangan informasi yang pesat membuat penambahan jaringan baru harus dilakukan dengan cepat, efektif, dan efisien. Menghubungkan dua jaringan lokal yang berbeda wilayah dibutuhkan metoda yang tepat tanpa biaya yang besar. Salah satu metode jaringan untuk menghubungkan dua jaringan lokal yang berbeda wilayah tanpa terkoneksi langsung secara fisik yaitu menggunakan metode tunneling. Salah satu metode tunneling adalah GRE. Metode GRE menggunakan Open vSwitch dengan menggunakan simulator mininet dengan topologi jaringan kampus sederhana telah dilakukan pada penelitian ini. Simulasi ini menghasilkan hasil yang diinginkan dengan terkoneksinya tiap host pada jaringan kampus yang berbeda wilayah.
APA, Harvard, Vancouver, ISO, and other styles
5

Effendi, Mufid Ridlo, Eki Ahmad Zaki Hamidi, and Andriansyah Saepulloh. "Implementasi GRE Tunneling Menggunakan Open vSwitch Pada Jaringan Kampus." TELKA - Telekomunikasi, Elektronika, Komputasi dan Kontrol 3, no. 2 (November 11, 2017): 103–11. http://dx.doi.org/10.15575/telka.v3n2.103-111.

Full text
Abstract:
Perkembangan informasi yang pesat membuat penambahan jaringan baru harus dilakukan dengan cepat, efektif, dan efisien. Menghubungkan dua jaringan lokal yang berbeda wilayah dibutuhkan metoda yang tepat tanpa biaya yang besar. Salah satu metode jaringan untuk menghubungkan dua jaringan lokal yang berbeda wilayah tanpa terkoneksi langsung secara fisik yaitu menggunakan metode tunneling. Salah satu metode tunneling adalah GRE. Metode GRE menggunakan Open vSwitch dengan menggunakan simulator mininet dengan topologi jaringan kampus sederhana telah dilakukan pada penelitian ini. Simulasi ini menghasilkan hasil yang diinginkan dengan terkoneksinya tiap host pada jaringan kampus yang berbeda wilayah.
APA, Harvard, Vancouver, ISO, and other styles
6

Yang, Runkai, Xiaolin Chang, Jelena Mišić, and Vojislav B. Mišić. "Performance Modeling of Linux Network System with Open vSwitch." Peer-to-Peer Networking and Applications 13, no. 1 (February 21, 2019): 151–62. http://dx.doi.org/10.1007/s12083-019-00723-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gao, Peixuan, Yang Xu, and H. Jonathan Chao. "OVS-CAB: Efficient rule-caching for Open vSwitch hardware offloading." Computer Networks 188 (April 2021): 107844. http://dx.doi.org/10.1016/j.comnet.2021.107844.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yang, Ye, Haiyang Jiang, Yulei Wu, Chunjing Han, Yilong Lv, Xing Li, Bowen Yang, Serge Fdida, and Gaogang Xie. "C2QoS: Network QoS guarantee in vSwitch through CPU-cycle management." Journal of Systems Architecture 116 (June 2021): 102148. http://dx.doi.org/10.1016/j.sysarc.2021.102148.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ma, Huihui, Xuanhao Luo, and Du Xu. "Intelligent queue management of open vSwitch in multi-tenant data center." Future Generation Computer Systems 144 (July 2023): 50–62. http://dx.doi.org/10.1016/j.future.2023.02.018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Osinski, Tomasz, Halina Tarasiuk, Paul Chaignon, and Mateusz Kossakowski. "A Runtime-Enabled P4 Extension to the Open vSwitch Packet Processing Pipeline." IEEE Transactions on Network and Service Management 18, no. 3 (September 2021): 2832–45. http://dx.doi.org/10.1109/tnsm.2021.3055900.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "VSwitch"

1

Šabart, Otto. "Testování Open vSwitch a DPDK." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2017. http://www.nusl.cz/ntk/nusl-363892.

Full text
Abstract:
The project is about the virtual switch called Open vSwitch and its architecture. It deals with an acceleration of the switch mainly by using Data Plane Development Kit (DPDK). Furthermore, it describes the architecture of the DPDK kit and analyses the individual functional units. Furthermore, it describes the architecture of the DPDK kit, analyses the individual functional units and describes the possibilities of its configuration. Another part of the project describes the methodology chosen for a performance testing of virtual switches. Subsequently, this methodology was used to make a design and environment implementation for fully automatic Open vSwitch s DPDK performance testing with the use of automatic systems such as Koji, Jenkins, Beaker a VSperf. Simultaneously, the tools for automatic comparison of produced results were implemented. The created environment was then used for the performance measurement of several basic Open vSwitch configurations with and without the use of DPDK. The implemented measurements are discussed and evaluated in the project. The final project's stage provides a great amount of the enlargement and improvement of the implemented tests.
APA, Harvard, Vancouver, ISO, and other styles
2

Yang, Ye. "Isolation Mechanisms within the vSwitch of Cloud Computing Platform." Electronic Thesis or Diss., Sorbonne université, 2022. http://www.theses.fr/2022SORUS191.

Full text
Abstract:
En tant que composant important de la plate-forme cloud, le commutateur virtuel (vSwitch) est responsable de la réalisation de la connectivité réseau entre les machines virtuelles (VM) et les périphériques externes. La plupart des vSwitches existants adoptent le principe de conception partagée, qui détruit l'isolation entre les VMs. Dans vSwitch, différentes VMs se disputent les ressources partagées et accèdent à la mémoire sans restriction, cela les rend incapables de garantir une qualité de service (QoS) réseau stable, tout en faisant face au risque d'attaques de plans de données et d'accès illégaux à la mémoire. Afin de résoudre ces problèmes de performance, de défaillance et de sécurité causés par le manque d'isolement, les principaux travaux et contributions de cette thèse sont les suivants : 1) Méthode QoS réseau basée sur l'isolation du cycle CPU (C2QoS). Cette approche garantit la bande passante du réseau VM en isolant la concurrence des ressources CPU, et en même temps réduisant de 80 % la latence supplémentaire du réseau de VM causée par la concurrence. 2) Mécanisme de défense contre les attaques du plan de données basé sur l'isolement de la table de flux (D-TSE). D-TSE utilise VM comme unité pour séparer la structure de la table de flux afin d'obtenir des performances de classification de paquets indépendantes et une isolation des pannes au prix d'une utilisation CPU supplémentaire de 5 %. 3) Mécanisme d'E/S réseau virtualisé (VNIO) basé sur l'isolation de l'accès mémoire (S2H). Basé sur un modèle de partage de mémoire sécurisé, S2H assure l'isolation et la sécurité de la mémoire des VM au prix d'une latence accrue de 2 à 9 %
As an important component of cloud platform, virtual switch (vSwitch) is responsible for achieving network connectivity between virtual machines (VMs) and external devices. Most existing vSwitches adopt the split design principle, which destroys the isolation between VMs. In vSwitch, different VMs compete for shared resources and unrestricted memory access, making them unable to guarantee stable network quality of service (QoS), while facing the risk of data plane attacks and illegal access to memory. In order to solve these performance, failure and security problems caused by the lack of isolation, the main works and contributions of this thesis are as follows: 1) Network QoS method based on CPU cycle isolation (C2QoS). This approach secures VM network bandwidth by isolating concurrency from CPU resources, and at the same time reduces additional VM network latency caused by concurrency by 80%. 2) Data plane attack defense mechanism based on stream table isolation (D-TSE). D-TSE uses VM as the unit to separate the flow table structure to achieve independent packet classification performance and fault isolation at the cost of 5% additional CPU usage. 3) Virtualized Network I/O (VNIO) mechanism based on Memory Access Isolation (S2H). Based on a secure memory sharing model, S2H provides VM memory isolation and security at the cost of 2-9% increased latency
APA, Harvard, Vancouver, ISO, and other styles
3

Harshini, Nekkanti. "Measuring And Modeling Of Open vSwitch Performance : Implementation in Docker." Thesis, Blekinge Tekniska Högskola, Institutionen för kommunikationssystem, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-13479.

Full text
Abstract:
Network virtualization has become an important aspect of the Telecom industry. The need forefficient, scalable and reliable virtualized network functions is paramount to modern networking.Open vSwitch is such virtual switch that attempts to extend the usage of virtual switches to industrygrade performance levels on heterogeneous platforms.The aim of the thesis is to give an insight into the working of Open vSwitch. To evaluate theperformance of Open vSwitch in various virtualization scenarios such as KVM (second companionthesis)[1] and Docker. To investigate different scheduling techniques offered by the Open vSwitchsoftware and supported by the Linux kernel such as FIFO, SFQ, CODEL, FQCODEL, HTB andHFSC. To differentiate the performance of Open vSwitch in these scenarios and scheduling capacitiesand determine the best scenario for optimum performance.The methodology of the thesis involved a physical model of the system used for real-timeexperimentation as well as quantitative analysis. Quantitative analysis of obtained results paved theway for unbiased conclusions. Experimental analysis was required to measure metrics such asthroughput, latency and jitter in order to grade the performance of Open vSwitch in the particularvirtualization scenario.The results of the thesis must be considered in context with a second companion thesis[1]. Both thethesis aim at measuring the performance of Open v-Switch but the virtualization scenarios (Dockerand KVM) which are chosen are different, However, this thesis outline the performance of Open vSwitch and linux bridge in docker scenario. Various scheduling techniques were measured fornetwork performance metrics across both Docker and KVM (second companion thesis) and it wasobserved that Docker performed better in terms of throughput, latency and jitter. In Docker scenarioamongst the scheduling algorithms measured, it has almost same throughput in all schedulingalgorithms and latency shows slight variation and FIFO has least latency, as it is a simplest algorithmand consists of default qdisk. Finally jitter also shows variation on all scheduling algorithms.The conclusion of the thesis is that the virtualization layer on which Open vSwitch operates is one ofthe main factors in determining the switching performance. The KVM scenario and Docker scenarioeach have different virtualization techniques that incur different overheads that in turn lead to differentmeasurements. This difference occurs in different packet scheduling techniques. Docker performsbetter than KVM for both bridges. In the Docker scenario Linux bridge performs better than that ofOpen vSwitch, throughput is almost constant and FIFO has a least latency amongst all schedulingalgorithms and jitter shows more variation in all scheduling algorithms.
APA, Harvard, Vancouver, ISO, and other styles
4

Pothuraju, Rohit. "Measuring and Modeling of Open vSwitch Performance : Implementation in KVM environment." Thesis, Blekinge Tekniska Högskola, Institutionen för kommunikationssystem, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-13519.

Full text
Abstract:
Network virtualization has become an important aspect of the Telecom industry. The need for efficient, scalable and reliable virtualized network functions is paramount to modern networking. Open vSwitch is a virtual switch that attempts to extend the usage of virtual switches to industry grade performance levels on heterogeneous platforms.The aim of the thesis is to give an insight into the working of Open vSwitch. To evaluate the performance of Open vSwitch in various virtualization scenarios such as KVM and Docker (from second companion thesis)[1]. To investigate different scheduling techniques offered by the Open vSwitch software and supported by the Linux kernel such as FIFO, SFQ, CODEL, FQCODEL, HTB and HFSC. To differentiate the performance of Open vSwitch in these scenarios and scheduling capacities and determine the best scenario for optimum performance.The methodology of the thesis involved a physical model of the system used for real-time experimentation as well as quantitative analysis. Quantitative analysis of obtained results paved the way for unbiased conclusions. Experimental analysis was required to measure metrics such as throughput, latency and jitter in order to grade the performance of Open vSwitch in the particular virtualization scenario.The result of this thesis must be considered in context with a second companion thesis[1]. Both the theses aim at measuring and modeling performance of Open vSwitch in NFV. However, the results of this thesis outline the performance of Open vSwitch and Linux bridge in KVM virtualization scenario. Various scheduling techniques were measured for network performance metrics and it was observed that Docker performed better in terms of throughput, latency and jitter. In the KVM scenario, from the throughput test it was observed that all algorithms perform similarly in terms of throughput, for both Open vSwitch and Linux bridges. In the round trip latency tests, it was seen that FIFO has the least round trip latency, CODEL and FQCODEL had the highest latencies. HTB and HFSC perform similarly in the latency test. In the jitter tests, it was seen that HTB and HFSC had highest average jitter measurements in UDP Stream test. CODEL and FQCODEL had the least jitter results for both Open vSwitch and Linux bridges.The conclusion of the thesis is that the virtualization layer on which Open vSwitch operates is one of the main factors in determining the switching performance. Docker performs better than KVM for both bridges. In the KVM scenario, irrespective of the scheduling algorithm considered, Open vSwitch performed better than Linux bridge. HTB had highest throughput and FIFO had least round trip latency. CODEL and FQCODEL are efficient scheduling algorithms with low jitter measurements.
APA, Harvard, Vancouver, ISO, and other styles
5

Medina, Chirinos Jorge Alberto. "Deconstructing Open vSwitch for Isolated Enclaves : A security enabler for SDN data plane." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-17261.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Elbashir, Khalid. "Trusted Execution Environments for Open vSwitch : A security enabler for the 5G mobile network." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-218070.

Full text
Abstract:
The advent of virtualization introduced the need for virtual switches to interconnect virtual machines deployed in a cloud infrastructure. With Software Defined Networking (SDN), a central controller can configure these virtual switches. Virtual switches execute on commodity operating systems. Open vSwitch is an open source project that is widely used in production cloud environments. If an adversary gains access with full privileges to the operating system hosting the virtual switch, then Open vSwitch becomes vulnerable to a variety of different attacks that could compromise the whole network. The purpose of this thesis project is to improve the security of Open vSwitch implementations in order to ensure that only authenticated switches and controllers can communicate with each other, while maintaining code integrity and confidentiality of keys and certificates. The thesis project proposes a design and shows an implementation that leverages Intel® Safe Guard Extensions (SGX) technology. A new library, TLSonSGX, is implemented. This library replaces the use of the OpenSSL library in Open vSwitch. In addition to implementing standard Transport Level Security (TLS) connectivity, TLSonSGX confines TLS communication in the protected memory enclave and hence protects TLS sensitive components necessary to provide confidentiality and integrity, such as private keys and negotiated symmetric keys. Moreover, TLSonSGX introduces new, secure, and automatic means to generate keys and obtain signed certificates from a central Certificate Authority that validates using Linux Integrity Measurements Architecture (IMA) that the Open vSwitch binaries have not been tampered with before issuing a signed certificate. The generated keys and obtained certificates are stored in the memory enclave and hence never exposed as plaintext outside the enclave. This new mechanism is a replacement for the existing manual and unsecure procedures (as described in Open vSwitch project). A security analysis of the system is provided as well as an examination of performance impact of the use of a trusted execution environment. Results show that generating keys and certificates using TLSonSGX takes less than 0.5 seconds while adding 30% latency overhead for the first packet in a flow compared to using OpenSSL when both are executed on Intel® CoreTM i7-6600U processor clocked at 2.6 GHz. These results show that TLSonSGX can enhance Open vSwitch security and reduce its TLS configuration overhead.
Framkomsten av virtualisering införde behovet av virtuella växlar för att koppla tillsammans virtuella maskiner placerade i molninfrastruktur. Med mjukvarubaserad nätverksteknik (SDN), kan ett centralt styrenhet konfigurera dessa virtuella växlar. Virtuella växlar kör på standardoperativsystem. Open vSwitch är ett open-source projekt som ofta används i molntjänster. Om en motståndare får tillgång med fullständiga privilegier till operativsystemet där Open vSwitch körs, blir Open vSwitch utsatt för olika attacker som kan kompromettera hela nätverket.  Syftet med detta examensarbete är att förbättra säkerheten hos Open vSwitch för att garantera att endast autentiserade växlar och styrenheter kan kommunicera med varandra, samtidigt som att upprätthålla kod integritet och konfidentialitet av nycklar och certifikat. Detta examensarbete föreslår en design och visar en implementation som andvändar Intel®s Safe Guard Extensions (SGX) teknologi. Ett nytt bibliotek, TLSonSGX, är implementerat. Detta bibliotek ersätter biblioteket OpenSSL i Open vSwitch. Utöver att det implementerar ett standard “Transport Layer Security” (TLS) anslutning, TLSonSGX begränsar TLS kommunikation i den skyddade minnes enklaven och skyddar därför TLS känsliga komponenter som är nödvändiga för att ge sekretess och integritet, såsom privata nycklar och förhandlade symmetriska nycklar. Dessutom introducerar TLSonSGX nya, säkra och automatiska medel för att generera nycklar och få signerade certifikat från en central certifikatmyndighet som validerar, med hjälp av Linux Integrity Measurements Architecture (IMA), att Open vSwitch-binärerna inte har manipulerats innan de utfärdade ett signerat certifikat. De genererade nycklarna och erhållna certifikat lagras i minnes enklaven och är därför aldrig utsatta utanför enklaven. Denna nya mekanism ersätter de manuella och osäkra procedurerna som beskrivs i Open vSwitch projektet. En säkerhetsanalys av systemet ges såväl som en granskning av prestandaffekten av användningen av en pålitlig exekveringsmiljö. Resultaten visar att använda TLSonSGX för att generera nycklar och certifikat tar mindre än 0,5 sekunder medan det lägger 30% latens overhead för det första paketet i ett flöde jämfört med att använda OpenSSL när båda exekveras på Intel® Core TM processor i7-6600U klockad vid 2,6 GHz. Dessa resultat visar att TLSonSGX kan förbättra Open vSwitch säkerhet och minska TLS konfigurationskostnaden.
APA, Harvard, Vancouver, ISO, and other styles
7

Singh, Jaswinder. "Performance evaluation of Linux Bridge and OVS in Xen." Thesis, Blekinge Tekniska Högskola, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-10825.

Full text
Abstract:
Virtualization is the key technology which has provided smarter and easier ways for effectively utilizing resources provided by the hypervisor. Virtualization allows multiple operative systems (OS) to run on a single hardware. The resources from a hardware are allocated to virtual machines (VM) by hypervisor. It is important to know how the performance of virtual switches used in hypervisor for network communication affect the network traffic.   Performance of Linux Bridge (LB) and Open vSwitch (OVS) is investigated in this study. The method that has been used in this research is experimentation. Two different scenarios are used to benchmark the performance of LB and OVS in virtual and non-virtual environment. Performance metrics bitrate is used to benchmark the performance LB and OVS. The results received from the experimental runs contains the ingress bitrate and egress bitrate of LB and OVS in virtual and non-virtual environment. The results also contain the ingress and egress bitrate values from scenarios with different memory and CPU cores in virtual environment. Results achieved in this thesis report are from multiple experiment configurations. From results it can concluded that LB and OVS have almost same performance in non-virtual environment. There are small differences in ingress and egress of both virtual switches.
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Binghan. "Software Defined Networking and Tunneling for Mobile Networks." Thesis, KTH, Kommunikationssystem, CoS, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-118376.

Full text
Abstract:
With the deployment of Long Term Evolution (LTE) networks, mobile networks will become an important infrastructure component in the cloud ecosystem.  However, in the cloud computing era, traditional routing and switching platforms do not meet the requirements of this new trend, especially in a mobile network environment. With the recent advances in software switches and efficient virtualization using commodity servers, Software Defined Networking (SDN) has emerged as a powerful technology to meet the new requirements for supporting a new generation of cloud service. This thesis describers an experimental investigation of cloud computing, SDN, and a mobile network’s packet core. The design of a mobile network exploiting the evolution of SDN is also presented. The actual implementation consists of a GTP enabled Open vSwitch together with the transparent mode of mobile network SDN evolution. Open vSwitch is a SDN product designed for computer networks. The implementation extends Open vSwitch with an implementation of the GTP protocol. This extension enables Open vSwitch to be an excellent SDN component for mobile networks. In transparent mode, a cloud data center is deployed without making any modification to the existing mobile networks.  In the practical evaluation of the GTP-U tunnel protocol implementation, the measured metrics are UDP and TCP throughput, end-to-end latency and jitter.  Two experiments have been conducted and described in the evaluation chapter. Cloud computing has become one of the hottest Internet topics. It is attractive for the mobile network to adopt cloud computing technology in order to enjoy the benefits of cloud computing. For example, to reduce network construction cost, make the network deployment more flexible, etc. This thesis presents an potential direction for mobile network cloud computing. Since this thesis relies on open source projects, readers may use the results to explore a feasible direction for mobile network cloud computing evolution.
Med utbyggnaden av långa (LTE) Term Evolution nätverk, mobila nätverk kommer blivit en viktig infrastruktur komponent i molnet ekosystemet. Men i cloud computing eran, uppfyller traditionella routing och switching plattformar inte kraven i denna nya trend, särskilt i ett mobilnät miljö. Med de senaste framstegen i programvara växlar och effektiv virtualisering påråvaror servrar, programvarustyrd Nätverk (SDN) har utvecklats till en kraftfull teknik för att möta de nya kraven för att stödja en ny generation av molntjänst. Denna avhandling beskrivarna en försöksverksamhet inriktad undersökning av cloud computing, SDN och ett mobilnät är Packet Core. Utformningen av ett mobilnät utnyttja SDN utveckling presenteras också. Det faktiska genomförandet består av en GTP aktiverad Open Vswitch tillsammans med transparent läge av mobilnätet SDN evolution. Öppna Vswitch är en SDN-produkt avsedd för datornätverk. Genomförandet utökar Open Vswitch med en implementering av GTP-protokollet. Denna uppgradering gör Open Vswitch vara som en utmärkt SDN komponent för mobila nätverk. I transparent läge är ett moln datacenter utplacerade utan göra eventuella ändringar till befintliga mobilnät. I den praktiska utvärderingen av GTP-U tunnel protokollimplementering, de uppmätta mått är UDP och TCP genomströmning, end-to-end-latens, jitter och paketförluster.  Tvåexperiment har utförts i utvärderingen kapitlet. Cloud computing har blivit en av de hetaste av Internet. Således kan framtiden för det mobila nätet ocksåanta teknik cloud computing och dra nytta av cloud computing. Till exempel minska kostnaderna nätbyggnad, gör nätverket distribuera mer flexibla, etc. .. Denna avhandling presenterar en möjlig inriktning för mobilnät cloud computing. Eftersom denna avhandling bygger påopen source-projekt, läsarna använda resultatet av den att utforska möjliga riktning mobilnät cloud computing utveckling.
APA, Harvard, Vancouver, ISO, and other styles
9

Raheem, Muhammad. "Mitigation of inter-domain Policy Violations at Internet eXchange Points." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-247908.

Full text
Abstract:
Economic incentives and the need to efficiently deliver Internet have led to the growth of Internet eXchange Points (IXPs), i.e., the interconnection networks through which a multitude of possibly competing network entities connect to each other with the goal of exchanging traffic. At IXPs, the exchange of traffic between two or more member networks is dictated by the Border gateway Protocol (BGP), i.e., the inter-domain routing protocol used by network operators to exchange reachability information about IP prefix destinations. There is a common “honest-closed-world” assumption at IXPs that two IXP members exchange data traffic only if they have exchanged the corresponding reachability information via BGP. This state of affairs severely hinders security as any IXP member can send traffic to another member without having received a route from that member. Filtering traffic according to BGP routes would solve the problem. However, IXP members can install filters but the number of filtering rules required at a large IXP can easily exceed the capacity of the network devices. In addition, an IXP cannot filter this type of traffic as the exchanged BGP routes between two members are not visible to the IXP itself. In this thesis, we evaluated the design space between reactive and proactive approaches for guaranteeing consistency between the BGP control-plane and the data-plane. In a reactive approach, an IXP member operator monitors, collects, and analyzes the incoming traffic to detect if any illegitimate traffic exists whereas, in a proactive approach, an operator configures its network devices to filter any illegitimate traffic without the need to perform any monitoring. We focused on proactive approaches because of the increased security of the IXP network and its inherent simplified network management. We designed and implemented a solution to this problem by leveraging the emerging Software Defined Networking (SDN) paradigm, which enables the programmability of the forwarding tables by separating the controland dataplanes. Our approach only installs rules in the data-plane that allow legitimate traffic to be forwarded, dropping anything else. As hardware switches have high performance but low memory space, we decided to make also use of software switches. A “heavy-hitter” module detects the forwarding rules carrying most of the traffic and installs them into the hardware switch. The remaining forwarding rules are installed into the software switches.We evaluated the prototype in an emulated testbed using the Mininet virtualnetwork environment. We analyzed the security of our system with the help of static verification tests, which confirmed compliance with security policies. The results reveal that with even just 10% of the rules installed in the hardware switch, the hardware switch directly filter 95% of the traffic volume with nonuniform Internet-like traffic distribution workloads. We also evaluated the latency and throughput overheads of the system, though the results are limited by the accuracy of the emulated environment. The scalability experiments show that, with 10K forwarding rules, the system takes around 40 seconds to install and update the data plane. This is due to inherent slowness of emulated environment and limitations of the POX controller, which is coded in Python.
Ekonomiska incitament och behovet av att effektivt leverera Internet har lett till tillväxten av Internet eXchange Points (IXP), dvs de sammankopplingsnät genom vilka en mängd möjligen konkurrerande nätverksenheter förbinder varandra med målet att utbyta trafik. Vid IXPs dikteras utbytet av trafik mellan två eller flera medlemsnät av gränsgatewayprotokollet (BGP), dvs det inter-domänroutingprotokollet som används av nätoperatörer för att utbyta tillgänglighetsinformation om IP-prefixdestinationer. Det finns ett gemensamt antagande om "honest-closed-world" vid IXP, att två IXP-medlemmar endast utbyter datatrafik om de har bytt ut motsvarande tillgänglighetsinformation via BGP. Detta tillstånd försvårar allvarligt säkerheten eftersom varje IXP-medlem kan skicka trafik till en annan medlem utan att ha mottagit en rutt från den medlemmen. Filtrering av trafik enligt BGP-vägar skulle lösa problemet. IXPmedlemmar kan dock installera filter men antalet filtreringsregler som krävs vid en stor IXP kan enkelt överskrida nätverksenheternas kapacitet. Dessutom kan en IXP inte filtrera denna typ av trafik eftersom de utbytta BGP-vägarna mellan två medlemmar inte är synliga för IXP-enheten själv.I denna avhandling utvärderade vi utrymmet mellan reaktiva och proaktiva metoder för att garantera överensstämmelse mellan BGP-kontrollplanet och dataplanet. I ett reaktivt tillvägagångssätt övervakar, samlar och analyserar en inkommande trafik en IXP-medlem för att upptäcka om någon obehörig trafik finns, medan en operatör konfigurerar sina nätverksenheter för att filtrera någon obehörig trafik utan att behöva övervaka . Vi fokuserade på proaktiva tillvägagångssätt på grund av den ökade säkerheten för IXP-nätverket och dess inneboende förenklad nätverkshantering. Vi konstruerade och genomförde en lösning på detta problem genom att utnyttja det nya SDN-paradigmet (Software Defined Networking), vilket möjliggör programmerbarheten hos vidarebefordringsborden genom att separera kontrolloch dataplanerna. Vårt tillvägagångssätt installerar bara regler i dataplanet som tillåter legitim trafik att vidarebefordras, släppa allt annat. Eftersom hårdvaruomkopplare har hög prestanda men lågt minne, bestämde vi oss för att även använda programvaruomkopplare. En "heavy-hitter" -modul detekterar vidarebefordringsreglerna som transporterar större delen av trafiken och installerar dem i hårdvaruomkopplaren. De återstående spolningsreglerna installeras i programvaruomkopplarna.Vi utvärderade prototypen i en emulerad testbädd med hjälp av virtuella nätverksmiljö Mininet. Vi analyserade säkerheten för vårt system med hjälp av statiska verifieringsprov, vilket bekräftade överensstämmelse med säkerhetspolicyerna. Resultaten visar att med bara 10% av de regler som installerats i hårdvaruomkopplaren filtrerar hårdvaruomkopplaren direkt 95% av trafikvolymen med ojämn Internetliknande trafikfördelningsarbete. Vi utvärderade också latensoch genomströmningsomkostnaderna för systemet, även om resultaten begränsas av noggrannheten hos den emulerade miljön. Skalbarhetsexperimenten visar att med 10K-vidarebefordringsregler tar systemet cirka 40 sekunder för att installera och uppdatera dataplanet. Detta beror på inneboende långsamma emulerade miljöer och begränsningar av POX-kontrollern, som kodas i Python.
APA, Harvard, Vancouver, ISO, and other styles
10

Vido, Matej. "Akcelerace OVS s využitím akcelerační karty s FPGA." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-385968.

Full text
Abstract:
The performance of the virtual switch Open vSwitch (OVS) is insufficient to satisfy the current requirements for link bandwidth of the server connections. There is an effort to accelerate the OVS both in the software and in the hardware by offloading the datapath to the smart network interface cards. In this work the COMBO card for 100G Ethernet developed by CESNET is used to accelerate the OVS. The suggested solution utilizes the firmware for FPGA generated from the definition in the P4 language to classify the packets in the card and DPDK for the data transfers and offloading the classification rules into the card. Forwarding of one flow with the shortest frames from physical to physical interface using one CPU core reaches forwarding rate of 11.2 Mp/s (10 times more than the standard OVS) with classification in the card and 5.9 Mp/s without classification in the card.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "VSwitch"

1

Herbert, Thomas F. SDN, Openflow, and Open VSwitch: Pocket Primer. Mercury Learning & Information, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sharma, Sachin. Practical Guide to Software Defined Networking Using Open VSwitch. Wiley & Sons, Limited, John, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "VSwitch"

1

Gupta, Milind, Shivangi Kochhar, Pulkit Jain, Manu Singh, and Vishal Sharma. "Overcoming the Security Shortcomings Between Open vSwitch and Network Controller." In Algorithms for Intelligent Systems, 143–49. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-0426-6_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Liu, Xinyu, Beumjin Cho, and Jong Kim. "SD-OVS: SYN Flooding Attack Defending Open vSwitch for SDN." In Information Security Applications, 29–41. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-56549-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Du, Ping, Maoke Chen, and Akihiro Nakao. "Port-Space Isolation for Multiplexing a Single IP Address Through Open vSwitch." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 113–22. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-17851-1_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sachin, Darekar, M. Z. Shaikh, and Harshal B. Kondke. "Network Behaviour of Open vSwitch as Per the Anticipated Functionality of Network Application Programmed Over SDN Using Pox Controller." In Second International Conference on Computer Networks and Communication Technologies, 705–13. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-37051-0_79.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

"A. Filter und Aktionen bei Open vSwitch." In Software Defined Networking, 251–54. De Gruyter Oldenbourg, 2016. http://dx.doi.org/10.1515/9783110451870-007.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "VSwitch"

1

Zha, Zili, An Wang, Yang Guo, Doug Montgomery, and Songqing Chen. "Instrumenting Open vSwitch with Monitoring Capabilities." In SOSR '18: Symposium on SDN Research. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3185467.3185478.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tseng, Janet, Ren Wang, James Tsai, Yipeng Wang, and Tsung-Yuan Charlie Tai. "Accelerating Open vSwitch with Integrated GPU." In SIGCOMM '17: ACM SIGCOMM 2017 Conference. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3098583.3098585.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bui, Dinh Thai, and Kahina Aberkane. "A generic interface for Open vSwitch." In 2016 IEEE NetSoft Conference and Workshops (NetSoft). IEEE, 2016. http://dx.doi.org/10.1109/netsoft.2016.7502442.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Jesse, and Behnam Dezfouli. "Predictable Bandwidth Slicing with Open vSwitch." In GLOBECOM 2021 - 2021 IEEE Global Communications Conference. IEEE, 2021. http://dx.doi.org/10.1109/globecom46510.2021.9685751.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cejka, Tomas, and Radek Krejci. "Configuration of open vSwitch using OF-CONFIG." In NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium. IEEE, 2016. http://dx.doi.org/10.1109/noms.2016.7502920.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tasoulas, Evangelos, Ernst Gunnar Gran, Bjorn Dag Johnsen, Kyrre Begnum, and Tor Skeie. "Towards the InfiniBand SR-IOV vSwitch Architecture." In 2015 IEEE International Conference on Cluster Computing (CLUSTER). IEEE, 2015. http://dx.doi.org/10.1109/cluster.2015.58.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, An, Yang Guo, Songqing Chen, Fang Hao, T. V. Lakshman, Doug Montgomery, and Kotikalapudi Sriram. "vPROM: VSwitch enhanced programmable measurement in SDN." In 2017 IEEE 25th International Conference on Network Protocols (ICNP). IEEE, 2017. http://dx.doi.org/10.1109/icnp.2017.8117567.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Barbosa, Roseli da R., Paulo A. L. Rego, Michel S. Bonfim, and Arthur de C. Callado. "Análise de Desempenho das Tecnologias de Virtualização de Rede da Plataforma OpenStack." In XVII Workshop em Desempenho de Sistemas Computacionais e de Comunicação. Sociedade Brasileira de Computação - SBC, 2018. http://dx.doi.org/10.5753/wperformance.2018.3334.

Full text
Abstract:
Com a popularidade da computação em nuvem, surgiu a necessidade de ampliar o suporte a múltiplos inquilinos pertencentes a redes logicamente independentes, fomentando o advento da virtualização de redes. Com o intuito de avaliar o desempenho das tecnologias de virtualização de redes, este trabalho utilizou a plataforma OpenStack visando comparar o desempenho de redes virtuais utilizando os protocolos de tunelamento VXLAN e GRE, com Linux Bridge e Open vSwitch. Com os experimentos, foi possível constatar que cenários utilizando Open vSwitch com VXLAN obtiveram maiores taxas de vazão entre nós de computação diferentes. No entanto, Linux Bridge com VXLAN apresentou menores taxas de latência e jitter na maioria dos cenários.
APA, Harvard, Vancouver, ISO, and other styles
9

Tu, William, Yi-Hung Wei, Gianni Antichi, and Ben Pfaff. "revisiting the open vSwitch dataplane ten years later." In SIGCOMM '21: ACM SIGCOMM 2021 Conference. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3452296.3472914.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Shanmugalingam, Sivasothy, Adlen Ksentini, and Philippe Bertin. "DPDK Open vSwitch performance validation with mirroring feature." In 2016 23rd International Conference on Telecommunications (ICT). IEEE, 2016. http://dx.doi.org/10.1109/ict.2016.7500387.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "VSwitch"

1

Pfaff, B. The Open vSwitch Database Management Protocol. Edited by B. Davie. RFC Editor, December 2013. http://dx.doi.org/10.17487/rfc7047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography