26 resultados para virtualisation


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Driven by new network and middleware technologies such as mobile broadband, near-field communication, and context awareness the so-called ambient lifestyle will foster innovative use cases in building automation, healthcare and agriculture. In the EU project Hydra1 highlevel security, trust and privacy concerns such as loss of control, profiling and surveillance are considered at the outset. At the end of this project the Hydra middleware development platform will have been designed so as to enable developers to realise secure ambient scenarios especially in the user domains of building automation, healthcare, and agriculture. This paper gives a short introduction to the Hydra project, its user domains and its approach to ensure security by design. Based on the results of a focus group analysis of the building automation domain typical threats are evaluated and their risks are assessed. Then, specific security requirements with respect to security, privacy, and trust are derived in order to incorporate them into the Hydra Security Meta Model. How concepts such as context security, semantic security, and virtualisation support the overall Hydra approach will be introduced and illustrated on the basis of a technical building automation scenario.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Driven by new network and middleware technologies such as mobile broadband, near-field communication, and context awareness the so-called ambient lifestyle will foster innovative use cases in different domains. In the EU project Hydra high-level security, trust and privacy concerns such as loss of control, profiling and surveillance are considered at the outset. At the end of this project the. Hydra middleware development platform will have been designed so as to enable developers to realise secure ambient scenarios. This paper gives a short introduction to the Hydra project and its approach to ensure security by design. Based on the results of a focus group analysis of the user domain "building automation" typical threats are evaluated and their risks are assessed. Then, specific security requirements with respect to security, privacy, and trust are derived in order to incorporate them into the Hydra Security Meta-Model. How concepts such as context, semantic resolution of security, and virtualisation support the overall Hydra approach will be introduced and illustrated on the basis of it technical building automation scenario.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recent advance in virtualisation technology enables service provisioning in a flexible way by consolidating several virtual machines (VMs) into a single physical machine (PM). The inter-VM communications are inevitable when a group of VMs in a data centre provide services in a collaborative manner. With the increasing demands of such intra-data-centre traffics, it becomes essential to study the VM-to-PM placement such that the aggregated communication cost within a data centre is minimised. Such optimisation problem is proved NP-hard and formulated as an integer programming with quadratic constraints in this paper. Different from existing work, our formulation takes into consideration of data-centre architecture, inter-VM traffic pattern, and resource capacity of PMs. Furthermore, a heuristic algorithm is proposed and its high efficiency is extensively validated.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The 5th generation of mobile networking introduces the concept of “Network slicing”, the network will be “sliced” horizontally, each slice will be compliant with different requirements in terms of network parameters such as bandwidth, latency. This technology is built on logical instead of physical resources, relies on virtual network as main concept to retrieve a logical resource. The Network Function Virtualisation provides the concept of logical resources for a virtual network function, enabling the concept virtual network; it relies on the Software Defined Networking as main technology to realize the virtual network as resource, it also define the concept of virtual network infrastructure with all components needed to enable the network slicing requirements. SDN itself uses cloud computing technology to realize the virtual network infrastructure, NFV uses also the virtual computing resources to enable the deployment of virtual network function instead of having custom hardware and software for each network function. The key of network slicing is the differentiation of slice in terms of Quality of Services parameters, which relies on the possibility to enable QoS management in cloud computing environment. The QoS in cloud computing denotes level of performances, reliability and availability offered. QoS is fundamental for cloud users, who expect providers to deliver the advertised quality characteristics, and for cloud providers, who need to find the right tradeoff between QoS levels that has possible to offer and operational costs. While QoS properties has received constant attention before the advent of cloud computing, performance heterogeneity and resource isolation mechanisms of cloud platforms have significantly complicated QoS analysis and deploying, prediction, and assurance. This is prompting several researchers to investigate automated QoS management methods that can leverage the high programmability of hardware and software resources in the cloud.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Contrary to both parties' declarations on the development of their "strategic partnership", relations between Russia and the European Union have over recent years been in a state which could be called one of crisis. However, this does not mean that there have been no achievements in EU-Russian relations. The key problem is that Russia and the European Union have essentially different perceptions, aspirations and interests, which causes mistrust and disillusionment. This crisis is manifested in mutual criticism by the two sides, regularly recurring tensions and cooling of relations ("minicrises"), and especially by the "virtualisation of co-operation", i.e. concealing a lack of substantive content in many key areas under increasingly rich layers of dialogue and co-operation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Due to environmental changes and business trends such as globalisation, outsourcing and virtualisation, more and more companies get involved in business activities that are outside their direct control. This typically occurs by entering into collaborative relationships and joint ventures with specialised companies in order to fulfil the demands of customers quickly (DiMaggio, 2001). Organisational structures that results from such collaborative relationships and joint ventures are referred to in this paper as enterprises and the management of them known as enterprise management. The authors use the definition of the European Commission (2003) that defines an enterprise as “… an entity, regardless of its legal form … including partnerships or associations regularly engaged in economic activities.” Therefore in its most simple form an enterprise could be a single integrated company. However, findings from this research show that enterprises can also be made up of parts of different companies and the structure of the enterprise is contingent upon a variety of different factors. The success of the enterprise as a collaborative venture depends on the ability of companies to intermediate their internal core competencies into other participating companies’ value streams and simultaneously outsource their own peripheral activities to companies that can perform them quicker, cheaper, and more effectively (Lal et al., 1995). In other words, the peripheral activities of one member-company must be complemented by a core competence of another member-company within an overall enterprise.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Due to environmental changes and business trends such as globalisation, outsourcing and virtualisation, more and more companies get involved in business activities that are outside their direct control. This typically occurs by entering into collaborative relationships and joint ventures with specialised companies in order to fulfil the demands of customers quickly (DiMaggio, 2001). Organisational structures that results from such collaborative relationships and joint ventures are referred to in this paper as enterprises and the management of them known as enterprise management. The authors use the definition of the European Commission (2003) that defines an enterprise as “… an entity, regardless of its legal form … including partnerships or associations regularly engaged in economic activities.” Therefore in its most simple form an enterprise could be a single integrated company. However, findings from this research show that enterprises can also be made up of parts of different companies and the structure of the enterprise is contingent upon a variety of different factors. The success of the enterprise as a collaborative venture depends on the ability of companies to intermediate their internal core competencies into other participating companies’ value streams and simultaneously outsource their own peripheral activities to companies that can perform them quicker, cheaper, and more effectively (Lal et al., 1995). In other words, the peripheral activities of one member-company must be complemented by a core competence of another member-company within an overall enterprise.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mainstream cinema is to an ever-increasing degree deploying digital imaging technologies to work with the human form; expanding on it, morphing its features, or providing new ways of presenting it. This has prompted theories of simulation and virtualisation to explore the cultural and aesthetic implications, anxieties, and possibilities of a loss of the ‘real’ – in turn often defined in terms of the photographic trace. This thesis wants to provide another perspective. Following instead some recent imperatives in art-theory, this study looks to introduce and expand on the notion of the human figure, as pertaining to processes of figuration rather than (only) representation. The notion of the figure and figuration have an extended history in the fields of hermeneutics, aesthetics, and philosophy, through which they have come to stand for particular theories and methodologies with regards to images and their communication of meaning. This objective of this study is to appropriate these for film-theory, culminating in two case-studies to demonstrate how formal parameters present and organise ideas of the body and the human. The aim is to develop a material approach to contemporary digital practices, where bodies have not ceased to matter but are framed in new ways by new technologies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Avec l’avènement des objets connectés, la bande passante nécessaire dépasse la capacité des interconnections électriques et interface sans fils dans les réseaux d’accès mais aussi dans les réseaux coeurs. Des systèmes photoniques haute capacité situés dans les réseaux d’accès utilisant la technologie radio sur fibre systèmes ont été proposés comme solution dans les réseaux sans fil de 5e générations. Afin de maximiser l’utilisation des ressources des serveurs et des ressources réseau, le cloud computing et des services de stockage sont en cours de déploiement. De cette manière, les ressources centralisées pourraient être diffusées de façon dynamique comme l’utilisateur final le souhaite. Chaque échange nécessitant une synchronisation entre le serveur et son infrastructure, une couche physique optique permet au cloud de supporter la virtualisation des réseaux et de les définir de façon logicielle. Les amplificateurs à semi-conducteurs réflectifs (RSOA) sont une technologie clé au niveau des ONU(unité de communications optiques) dans les réseaux d’accès passif (PON) à fibres. Nous examinons ici la possibilité d’utiliser un RSOA et la technologie radio sur fibre pour transporter des signaux sans fil ainsi qu’un signal numérique sur un PON. La radio sur fibres peut être facilement réalisée grâce à l’insensibilité a la longueur d’onde du RSOA. Le choix de la longueur d’onde pour la couche physique est cependant choisi dans les couches 2/3 du modèle OSI. Les interactions entre la couche physique et la commutation de réseaux peuvent être faites par l’ajout d’un contrôleur SDN pour inclure des gestionnaires de couches optiques. La virtualisation réseau pourrait ainsi bénéficier d’une couche optique flexible grâce des ressources réseau dynamique et adaptée. Dans ce mémoire, nous étudions un système disposant d’une couche physique optique basé sur un RSOA. Celle-ci nous permet de façon simultanée un envoi de signaux sans fil et le transport de signaux numérique au format modulation tout ou rien (OOK) dans un système WDM(multiplexage en longueur d’onde)-PON. Le RSOA a été caractérisé pour montrer sa capacité à gérer une plage dynamique élevée du signal sans fil analogique. Ensuite, les signaux RF et IF du système de fibres sont comparés avec ses avantages et ses inconvénients. Finalement, nous réalisons de façon expérimentale une liaison point à point WDM utilisant la transmission en duplex intégral d’un signal wifi analogique ainsi qu’un signal descendant au format OOK. En introduisant deux mélangeurs RF dans la liaison montante, nous avons résolu le problème d’incompatibilité avec le système sans fil basé sur le TDD (multiplexage en temps duplexé).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Service virtualisation is a supporting tool for DevOps to generate interactive service models of dependency systems on which a system-under-test relies. These service models allow applications under development to be continuously tested against production-like conditions. Generating these virtual service models requires expert knowledge of the service protocol, which may not always be available. However, service models may be generated automatically from network traces. Previous work has used the Needleman-Wunsch algorithm to select a response from the service model to play back for a live request. We propose an extension of the Needleman-Wunsch algorithm, which uses entropy analysis to automatically detect the critical matching fields for selecting a response. Empirical tests against four enterprise protocols demonstrate that entropy weighted matching can improve response accuracy.