performance evaluation of virtualization of real time server
DESCRIPTION
It is about performance evaluation of Real time server such VoIP server on virtualized environmentTRANSCRIPT
O my Lord! Expand for me my breast [with assurance] and ease for me my task and untie the knot from my tongue that they may understand my speech. (Ta-Ha:25-28)
Performance Evaluation of Virtualization of Real Time Server.
Manjur Kolhar Ph. D
Contents
▪ Basics
▪ IaaS
▪ Virtualization
▪ Benefits of IaaS
▪ VoIP
▪ Common Threats for VoIP
▪ Centralized solution to avoid threats
▪ Performance Evaluation
Basics
Continued
IaaS (Infrastructure as a Service)
▪ We have built our architecture on IaaS
We have used
1. virtualization
2. Server
3. Networking
4. Storage
Virtualization
▪ Virtualization is the creation of a virtual (rather than actual) version of something, such as an operating system, a server, a storage device or network resources.
Benefits of IaaS
VoIP (Voice over Internet Protocol)
▪ Voice over IP (VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet.
Continued….
TCP too, but…
Common threats for VoIP
Eavesdropping
Common threats for VoIP
DDoS
Common threats for VoIP
Vishing and SPIT
Common threats for VoIP
Man in Middle Attack
Literature Survey
Our Proposed Scheme
Our Nodes
Evaluation
Evaluation
Illustration of RRD with security shield
Evaluation
Illustration of RRD without security shield
Evaluation
Illustration of SRD without security shield
Evaluation
Average CPU utilization of virtual Machines with Security Options
Conclusion
A centralized security solution is more suitable for cloud-based services because it never requires the intervention of end users. However, the end user can protect the network by means of hardware and software based solutions, which are already implemented by their respective networks. With the centralized approach, the management of VM-VoIP services and the configuration of the cloud services for threats will be easy for the administrator. Moreover, the SLA-based agreement will also help cloud service providers prioritize the traffic. This proposed solution is good enough small number of VoIP users. However, to utilize VM-VoIP in a bigger environment with best of QoS services, security shield should be isolated from VM-VoIP.
References1.Drutskoy, Dmitry, Eric Keller, and Jennifer Rexford. "Scalable network virtualization in software-defined networks." Internet Computing, IEEE 17, no. 2 (2013): 20-27.
2.Barker, Sean Kenneth, and Prashant Shenoy. "Empirical evaluation of latency-sensitive application performance in the cloud." In Proceedings of the first annual ACM SIGMM conference on Multimedia systems, pp. 35-46. ACM, 2010.
3.Rosenblum, Mendel, and Tal Garfinkel. "Virtual machine monitors: Current technology and future trends." Computer 38, no. 5 (2005): 39-47.
4.Salah, Khaled, Jose M. Alcaraz Calero, Sherali Zeadally, Sameera Al-Mulla, and Mohammed Alzaabi. "Using Cloud Computing to Implement a Security Overlay Network." IEEE security & privacy 11, no. 1 (2013): 44-53.
Questions ?