performance evaluation of virtualization of real time server

25
O my Lord! Expand for me my breast [with assurance] and ease for me my task and untie the knot from my tongue that they may understand my speech. (Ta-Ha:25-28)

Upload: raisa-manzoor-kolhar

Post on 05-Jan-2016

23 views

Category:

Documents


0 download

DESCRIPTION

It is about performance evaluation of Real time server such VoIP server on virtualized environment

TRANSCRIPT

Page 1: Performance Evaluation of Virtualization of Real Time Server

O my Lord! Expand for me my breast [with assurance] and ease for me my task and untie the knot from my tongue that they may understand my speech. (Ta-Ha:25-28)

Page 2: Performance Evaluation of Virtualization of Real Time Server

Performance Evaluation of Virtualization of Real Time Server.

Manjur Kolhar Ph. D

Page 3: Performance Evaluation of Virtualization of Real Time Server

Contents

▪ Basics

▪ IaaS

▪ Virtualization

▪ Benefits of IaaS

▪ VoIP

▪ Common Threats for VoIP

▪ Centralized solution to avoid threats

▪ Performance Evaluation

Page 4: Performance Evaluation of Virtualization of Real Time Server

Basics

Page 5: Performance Evaluation of Virtualization of Real Time Server

Continued

Page 6: Performance Evaluation of Virtualization of Real Time Server

IaaS (Infrastructure as a Service)

▪ We have built our architecture on IaaS

We have used

1. virtualization

2. Server

3. Networking

4. Storage

Page 7: Performance Evaluation of Virtualization of Real Time Server

Virtualization

▪ Virtualization is the creation of a virtual (rather than actual) version of something, such as an operating system, a server, a storage device or network resources.

Page 8: Performance Evaluation of Virtualization of Real Time Server

Benefits of IaaS

Page 9: Performance Evaluation of Virtualization of Real Time Server

VoIP (Voice over Internet Protocol)

▪ Voice over IP (VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet.

Page 10: Performance Evaluation of Virtualization of Real Time Server

Continued….

TCP too, but…

Page 11: Performance Evaluation of Virtualization of Real Time Server

Common threats for VoIP

Eavesdropping

Page 12: Performance Evaluation of Virtualization of Real Time Server

Common threats for VoIP

DDoS

Page 13: Performance Evaluation of Virtualization of Real Time Server

Common threats for VoIP

Vishing and SPIT

Page 14: Performance Evaluation of Virtualization of Real Time Server

Common threats for VoIP

Man in Middle Attack

Page 15: Performance Evaluation of Virtualization of Real Time Server

Literature Survey

Page 16: Performance Evaluation of Virtualization of Real Time Server

Our Proposed Scheme

Page 17: Performance Evaluation of Virtualization of Real Time Server

Our Nodes

Page 18: Performance Evaluation of Virtualization of Real Time Server

Evaluation

Page 19: Performance Evaluation of Virtualization of Real Time Server

Evaluation

Illustration of RRD with security shield

Page 20: Performance Evaluation of Virtualization of Real Time Server

Evaluation

Illustration of RRD without security shield

Page 21: Performance Evaluation of Virtualization of Real Time Server

Evaluation

Illustration of SRD without security shield

Page 22: Performance Evaluation of Virtualization of Real Time Server

Evaluation

Average CPU utilization of virtual Machines with Security Options

Page 23: Performance Evaluation of Virtualization of Real Time Server

Conclusion

A centralized security solution is more suitable for cloud-based services because it never requires the intervention of end users. However, the end user can protect the network by means of hardware and software based solutions, which are already implemented by their respective networks. With the centralized approach, the management of VM-VoIP services and the configuration of the cloud services for threats will be easy for the administrator. Moreover, the SLA-based agreement will also help cloud service providers prioritize the traffic. This proposed solution is good enough small number of VoIP users. However, to utilize VM-VoIP in a bigger environment with best of QoS services, security shield should be isolated from VM-VoIP.

Page 24: Performance Evaluation of Virtualization of Real Time Server

References1.Drutskoy, Dmitry, Eric Keller, and Jennifer Rexford. "Scalable network virtualization in software-defined networks." Internet Computing, IEEE 17, no. 2 (2013): 20-27.

2.Barker, Sean Kenneth, and Prashant Shenoy. "Empirical evaluation of latency-sensitive application performance in the cloud." In Proceedings of the first annual ACM SIGMM conference on Multimedia systems, pp. 35-46. ACM, 2010.

3.Rosenblum, Mendel, and Tal Garfinkel. "Virtual machine monitors: Current technology and future trends." Computer 38, no. 5 (2005): 39-47.

4.Salah, Khaled, Jose M. Alcaraz Calero, Sherali Zeadally, Sameera Al-Mulla, and Mohammed Alzaabi. "Using Cloud Computing to Implement a Security Overlay Network." IEEE security & privacy 11, no. 1 (2013): 44-53.

Page 25: Performance Evaluation of Virtualization of Real Time Server

Questions ?