dc.contributor.author | Kamisiński, Andrzej | |
dc.contributor.author | Helvik, Bjarne Emil | |
dc.contributor.author | Gonzalez, Andres Javier | |
dc.contributor.author | Nencioni, Gianfranco | |
dc.date.accessioned | 2017-12-18T12:07:19Z | |
dc.date.available | 2017-12-18T12:07:19Z | |
dc.date.created | 2017-12-15T09:04:10Z | |
dc.date.issued | 2017 | |
dc.identifier.isbn | 978-1-5386-3285-7 | |
dc.identifier.uri | http://hdl.handle.net/11250/2472468 | |
dc.description.abstract | Dependability of computer and communication networks is an important aspect of the customer-provider relationship in the telecommunication industry. Considering the increasing interest in Software-Defined Networking (SDN) technologies, as well as unclear understanding of dependability in the context of traffic flows in such networks, it is not clear how to define the related objectives in Service Level Agreements (SLAs), and how to estimate the risk of violation of the included dependability requirements. In this paper, we present a solution to both issues and we evaluate it in different scenarios by simulation. The results show that the proposed method is feasible and may help service providers to select the preferred recovery technique in SDN based on the estimated risk of violation of the SLA dependability requirements and known Service Level Objectives (SLOs). | nb_NO |
dc.language.iso | eng | nb_NO |
dc.publisher | IEEE | nb_NO |
dc.relation.ispartof | 2017 IEEE Conference on Network Function Virtualization and Software-Defined Networking (NFV-SDN) | |
dc.title | Assessing the risk of violating SLA dependability requirements in software-defined networks | nb_NO |
dc.type | Chapter | nb_NO |
dc.type | Peer reviewed | nb_NO |
dc.description.version | acceptedVersion | nb_NO |
dc.source.pagenumber | 270-275 | nb_NO |
dc.identifier.doi | 10.1109/NFV-SDN.2017.8169885 | |
dc.identifier.cristin | 1527770 | |
dc.description.localcode | © 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. This is the authors' accepted and refereed manuscript to the article. | nb_NO |
cristin.unitcode | 194,63,30,0 | |
cristin.unitname | Institutt for informasjonssikkerhet og kommunikasjonsteknologi | |
cristin.ispublished | true | |
cristin.fulltext | postprint | |
cristin.qualitycode | 1 | |