Network Virtualization Using VPN for Stable Communication with Offshore Cloud

被引:1
|
作者
Fujikawa, Hiroshi [1 ]
Yamaki, Hirofumi [2 ]
Yamamoto, Yukiko [3 ]
Tsuruta, Setsuo [2 ]
机构
[1] Shanghai Maruka Comp Informat Technol Co Ltd, Inzai, Japan
[2] Tokyo Denki Univ, Sch Informat Environm, Inzai, Japan
[3] Tokyo Denki Univ, Grad Sch Informat Environm, Inzai, Japan
关键词
cloud computing; detection; intentional network barrier; differential value; VPN bypass; QoS; network simulator; traffic differentiation;
D O I
10.1109/SITIS.2015.128
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
It has become common to access cloud computers in other countries via the Internet. However, in some countries, many international communication channels are suddenly shut down by governmental bodies. This causes significant degradation of the Quality of Service (QoS) for accessing cloud computers, Web conferences, and so on. To cope with this, we propose a network virtualization method for intelligent routers to detect the restriction of international communication and form VPN bypass. The routers placed at user's offices bypass/switch routes from the internet to VPN contracted by each enterprise or company to ensure QoS and only during shutdown and the like not to be regulated by governmental bodies. More concretely, a method for applying asymmetric criteria to decide whether to bypass is proposed for robust Internet operation to keep connections with cloud servers. Differential values of network latency are used for detecting the start of intentional network barriers, and absolute threshold values to determine both their start and end. This method is verified by a network simulator as well as latency on real regulation. Validation has been done by more than 50 offices' successful real usage.
引用
收藏
页码:200 / 207
页数:8
相关论文
共 50 条
  • [21] Network virtualization as an integrated solution for emergency communication
    Peter Dedecker
    Jeroen Hoebeke
    Ingrid Moerman
    Joris Moreau
    Piet Demeester
    Telecommunication Systems, 2013, 52 : 1859 - 1876
  • [22] Network virtualization as an integrated solution for emergency communication
    Dedecker, Peter
    Hoebeke, Jeroen
    Moerman, Ingrid
    Moreau, Joris
    Demeester, Piet
    TELECOMMUNICATION SYSTEMS, 2013, 52 (04) : 1859 - 1876
  • [23] Intelligent Bypass Method Exploiting VPN for Stable Offshore Business on the Internet
    Fujikawa, Hiroshi
    Yamaki, Hirofumi
    Yamamoto, Yukiko
    Tsuruta, Setsuo
    2016 WORLD AUTOMATION CONGRESS (WAC), 2016,
  • [24] Cooperative communication for future wireless network virtualization
    Parameshachari, B. D.
    Mumtaz, Shahid
    Kara, Ferdi
    Rinaldi, Stefano
    PHYSICAL COMMUNICATION, 2023, 59
  • [25] Network Function Virtualization in the Multi-Tenant Cloud
    Yu, Ruozhou
    Xue, Guoliang
    Kilari, Vishnu Teja
    Zhang, Xiang
    IEEE NETWORK, 2015, 29 (03): : 42 - 47
  • [26] Towards Network Virtualization Management for Federated Cloud Systems
    Luo, Mon-Yen
    Lin, Shang-Wei
    Chen, Jun-Yi
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 597 - +
  • [27] A Survey of Emerging Network Virtualization Frameworks and Cloud Computing
    Gupta, Tushar
    Ganatra, Jaydeep
    Samdani, Krishna
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE CONFLUENCE 2018 ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING, 2018, : 193 - 198
  • [28] Improving Network I/O Virtualization for Cloud Computing
    Bourguiba, Manel
    Haddadou, Kamel
    El Korbi, Ines
    Pujolle, Guy
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (03) : 673 - 681
  • [29] Cloud-based Network Virtualization in IoT with OpenStack
    Benomar, Zakaria
    Longo, Francesco
    Merlino, Giovanni
    Puliafito, Antonio
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2022, 22 (01)
  • [30] Preventing malicious communication using virtualization
    Kiperberg, Michael
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 61