End-to-end service orchestration across SDN and cloud computing domains

Author(s):  
Roberto Bonafiglia ◽  
Gabriele Castellano ◽  
Ivano Cerrato ◽  
Fulvio Risso
2021 ◽  
Vol 11 (7) ◽  
pp. 2925
Author(s):  
Edgar Cortés Gallardo Medina ◽  
Victor Miguel Velazquez Espitia ◽  
Daniela Chípuli Silva ◽  
Sebastián Fernández Ruiz de las Cuevas ◽  
Marco Palacios Hirata ◽  
...  

Autonomous vehicles are increasingly becoming a necessary trend towards building the smart cities of the future. Numerous proposals have been presented in recent years to tackle particular aspects of the working pipeline towards creating a functional end-to-end system, such as object detection, tracking, path planning, sentiment or intent detection, amongst others. Nevertheless, few efforts have been made to systematically compile all of these systems into a single proposal that also considers the real challenges these systems will have on the road, such as real-time computation, hardware capabilities, etc. This paper reviews the latest techniques towards creating our own end-to-end autonomous vehicle system, considering the state-of-the-art methods on object detection, and the possible incorporation of distributed systems and parallelization to deploy these methods. Our findings show that while techniques such as convolutional neural networks, recurrent neural networks, and long short-term memory can effectively handle the initial detection and path planning tasks, more efforts are required to implement cloud computing to reduce the computational time that these methods demand. Additionally, we have mapped different strategies to handle the parallelization task, both within and between the networks.


2021 ◽  
Author(s):  
Yanxia Tan ◽  
Yong Zhang ◽  
Yanlei Zheng ◽  
Yacheng Liu ◽  
Guangquan Wang ◽  
...  

2020 ◽  
Vol 12 (7) ◽  
pp. 2782 ◽  
Author(s):  
Adeel Rafiq ◽  
Asif Mehmood ◽  
Talha Ahmed Khan ◽  
Khizar Abbas ◽  
Muhammad Afaq ◽  
...  

On-demand service is the main feature of the 5G network, and Network Function Virtualization (NFV) provides it by virtualizing the existing 5G network infrastructure. NFV crafts various virtual networks on a shared physical network, but one of the core challenges in future 5G networks is to automate the modeling of Virtualized Network Functions (VNFs) and end-to-end Network Service (NS) orchestration with less human interaction. Traditionally, the descriptor of VNF and NS is created manually, which requires expert-level skills. This manual approach has a big threat of human error, which can be avoided by using the Intent-Based Networking (IBN) approach. The IBN approach eliminates the requirement of expertise for designing VNFs and NS by taking users’ intentions as an input. In this paper, the proposed system presents the Intent Management System for VNF modeling and end-to-end NS orchestration for multi-platforms. This system takes the high-level information related to a specific service, configures it accordingly, and converts it into the selected platform. The proposed system is tested using Mobile Central Office Re-architected as Data Center (M-CORD) and Open-Source Management and Orchestration (OSM) orchestrators. The results section shows that the proposed system reduces the effort of the end-user in creating network slices and provides seamless end-to-end service orchestration.


2018 ◽  
Vol 7 (3.27) ◽  
pp. 318
Author(s):  
K Kalaiselvi ◽  
N Jayashri ◽  
G Saraswathi

Cloud computing providing confidentiality over the insensitive data was the major issue related to security. It verifies the data owned by the server through linear computations. The proposed work enables security and efficiency using the cryptographic techniques of hybrid algorithms, securing the sensitive information that is present in the cloud. In the hybrid algorithm, it is the combination of problem encryption, key generation, result decryption and proof generation. It also validates the results which are being computed and also provides end-to-end confidentiality over the data to both the end user. The uses of hybrid algorithm results in a random key generation, encrypt/decrypt, and validate the satisfied results. This will provide a low cost to both server and client.  


Sign in / Sign up

Export Citation Format

Share Document