Performance Evaluation of Virtualization of Real Time Server

Post on 05-Jan-2016

17 views 0 download

Tags:

description

It is about performance evaluation of Real time server such VoIP server on virtualized environment

Transcript of Performance Evaluation of Virtualization of Real Time Server

O my Lord! Expand for me my breast [with assurance] and ease for me my task and untie the knot from my tongue that they may understand my speech. (Ta-Ha:25-28)

Performance Evaluation of Virtualization of Real Time Server.

Manjur Kolhar Ph. D

Contents

▪ Basics

▪ IaaS

▪ Virtualization

▪ Benefits of IaaS

▪ VoIP

▪ Common Threats for VoIP

▪ Centralized solution to avoid threats

▪ Performance Evaluation

Basics

Continued

IaaS (Infrastructure as a Service)

▪ We have built our architecture on IaaS

We have used

1. virtualization

2. Server

3. Networking

4. Storage

Virtualization

▪ Virtualization is the creation of a virtual (rather than actual) version of something, such as an operating system, a server, a storage device or network resources.

Benefits of IaaS

VoIP (Voice over Internet Protocol)

▪ Voice over IP (VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet.

Continued….

TCP too, but…

Common threats for VoIP

Eavesdropping

Common threats for VoIP

DDoS

Common threats for VoIP

Vishing and SPIT

Common threats for VoIP

Man in Middle Attack

Literature Survey

Our Proposed Scheme

Our Nodes

Evaluation

Evaluation

Illustration of RRD with security shield

Evaluation

Illustration of RRD without security shield

Evaluation

Illustration of SRD without security shield

Evaluation

Average CPU utilization of virtual Machines with Security Options

Conclusion

A centralized security solution is more suitable for cloud-based services because it never requires the intervention of end users. However, the end user can protect the network by means of hardware and software based solutions, which are already implemented by their respective networks. With the centralized approach, the management of VM-VoIP services and the configuration of the cloud services for threats will be easy for the administrator. Moreover, the SLA-based agreement will also help cloud service providers prioritize the traffic. This proposed solution is good enough small number of VoIP users. However, to utilize VM-VoIP in a bigger environment with best of QoS services, security shield should be isolated from VM-VoIP.

References1.Drutskoy, Dmitry, Eric Keller, and Jennifer Rexford. "Scalable network virtualization in software-defined networks." Internet Computing, IEEE 17, no. 2 (2013): 20-27.

2.Barker, Sean Kenneth, and Prashant Shenoy. "Empirical evaluation of latency-sensitive application performance in the cloud." In Proceedings of the first annual ACM SIGMM conference on Multimedia systems, pp. 35-46. ACM, 2010.

3.Rosenblum, Mendel, and Tal Garfinkel. "Virtual machine monitors: Current technology and future trends." Computer 38, no. 5 (2005): 39-47.

4.Salah, Khaled, Jose M. Alcaraz Calero, Sherali Zeadally, Sameera Al-Mulla, and Mohammed Alzaabi. "Using Cloud Computing to Implement a Security Overlay Network." IEEE security & privacy 11, no. 1 (2013): 44-53.

Questions ?