performance evaluation of virtualization of real time server
DESCRIPTION
It is about performance evaluation of Real time server such VoIP server on virtualized environmentTRANSCRIPT
![Page 1: Performance Evaluation of Virtualization of Real Time Server](https://reader036.vdocuments.mx/reader036/viewer/2022062722/563db81b550346aa9a909f8c/html5/thumbnails/1.jpg)
O my Lord! Expand for me my breast [with assurance] and ease for me my task and untie the knot from my tongue that they may understand my speech. (Ta-Ha:25-28)
![Page 2: Performance Evaluation of Virtualization of Real Time Server](https://reader036.vdocuments.mx/reader036/viewer/2022062722/563db81b550346aa9a909f8c/html5/thumbnails/2.jpg)
Performance Evaluation of Virtualization of Real Time Server.
Manjur Kolhar Ph. D
![Page 3: Performance Evaluation of Virtualization of Real Time Server](https://reader036.vdocuments.mx/reader036/viewer/2022062722/563db81b550346aa9a909f8c/html5/thumbnails/3.jpg)
Contents
▪ Basics
▪ IaaS
▪ Virtualization
▪ Benefits of IaaS
▪ VoIP
▪ Common Threats for VoIP
▪ Centralized solution to avoid threats
▪ Performance Evaluation
![Page 4: Performance Evaluation of Virtualization of Real Time Server](https://reader036.vdocuments.mx/reader036/viewer/2022062722/563db81b550346aa9a909f8c/html5/thumbnails/4.jpg)
Basics
![Page 5: Performance Evaluation of Virtualization of Real Time Server](https://reader036.vdocuments.mx/reader036/viewer/2022062722/563db81b550346aa9a909f8c/html5/thumbnails/5.jpg)
Continued
![Page 6: Performance Evaluation of Virtualization of Real Time Server](https://reader036.vdocuments.mx/reader036/viewer/2022062722/563db81b550346aa9a909f8c/html5/thumbnails/6.jpg)
IaaS (Infrastructure as a Service)
▪ We have built our architecture on IaaS
We have used
1. virtualization
2. Server
3. Networking
4. Storage
![Page 7: Performance Evaluation of Virtualization of Real Time Server](https://reader036.vdocuments.mx/reader036/viewer/2022062722/563db81b550346aa9a909f8c/html5/thumbnails/7.jpg)
Virtualization
▪ Virtualization is the creation of a virtual (rather than actual) version of something, such as an operating system, a server, a storage device or network resources.
![Page 8: Performance Evaluation of Virtualization of Real Time Server](https://reader036.vdocuments.mx/reader036/viewer/2022062722/563db81b550346aa9a909f8c/html5/thumbnails/8.jpg)
Benefits of IaaS
![Page 9: Performance Evaluation of Virtualization of Real Time Server](https://reader036.vdocuments.mx/reader036/viewer/2022062722/563db81b550346aa9a909f8c/html5/thumbnails/9.jpg)
VoIP (Voice over Internet Protocol)
▪ Voice over IP (VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet.
![Page 10: Performance Evaluation of Virtualization of Real Time Server](https://reader036.vdocuments.mx/reader036/viewer/2022062722/563db81b550346aa9a909f8c/html5/thumbnails/10.jpg)
Continued….
TCP too, but…
![Page 11: Performance Evaluation of Virtualization of Real Time Server](https://reader036.vdocuments.mx/reader036/viewer/2022062722/563db81b550346aa9a909f8c/html5/thumbnails/11.jpg)
Common threats for VoIP
Eavesdropping
![Page 12: Performance Evaluation of Virtualization of Real Time Server](https://reader036.vdocuments.mx/reader036/viewer/2022062722/563db81b550346aa9a909f8c/html5/thumbnails/12.jpg)
Common threats for VoIP
DDoS
![Page 13: Performance Evaluation of Virtualization of Real Time Server](https://reader036.vdocuments.mx/reader036/viewer/2022062722/563db81b550346aa9a909f8c/html5/thumbnails/13.jpg)
Common threats for VoIP
Vishing and SPIT
![Page 14: Performance Evaluation of Virtualization of Real Time Server](https://reader036.vdocuments.mx/reader036/viewer/2022062722/563db81b550346aa9a909f8c/html5/thumbnails/14.jpg)
Common threats for VoIP
Man in Middle Attack
![Page 15: Performance Evaluation of Virtualization of Real Time Server](https://reader036.vdocuments.mx/reader036/viewer/2022062722/563db81b550346aa9a909f8c/html5/thumbnails/15.jpg)
Literature Survey
![Page 16: Performance Evaluation of Virtualization of Real Time Server](https://reader036.vdocuments.mx/reader036/viewer/2022062722/563db81b550346aa9a909f8c/html5/thumbnails/16.jpg)
Our Proposed Scheme
![Page 17: Performance Evaluation of Virtualization of Real Time Server](https://reader036.vdocuments.mx/reader036/viewer/2022062722/563db81b550346aa9a909f8c/html5/thumbnails/17.jpg)
Our Nodes
![Page 18: Performance Evaluation of Virtualization of Real Time Server](https://reader036.vdocuments.mx/reader036/viewer/2022062722/563db81b550346aa9a909f8c/html5/thumbnails/18.jpg)
Evaluation
![Page 19: Performance Evaluation of Virtualization of Real Time Server](https://reader036.vdocuments.mx/reader036/viewer/2022062722/563db81b550346aa9a909f8c/html5/thumbnails/19.jpg)
Evaluation
Illustration of RRD with security shield
![Page 20: Performance Evaluation of Virtualization of Real Time Server](https://reader036.vdocuments.mx/reader036/viewer/2022062722/563db81b550346aa9a909f8c/html5/thumbnails/20.jpg)
Evaluation
Illustration of RRD without security shield
![Page 21: Performance Evaluation of Virtualization of Real Time Server](https://reader036.vdocuments.mx/reader036/viewer/2022062722/563db81b550346aa9a909f8c/html5/thumbnails/21.jpg)
Evaluation
Illustration of SRD without security shield
![Page 22: Performance Evaluation of Virtualization of Real Time Server](https://reader036.vdocuments.mx/reader036/viewer/2022062722/563db81b550346aa9a909f8c/html5/thumbnails/22.jpg)
Evaluation
Average CPU utilization of virtual Machines with Security Options
![Page 23: Performance Evaluation of Virtualization of Real Time Server](https://reader036.vdocuments.mx/reader036/viewer/2022062722/563db81b550346aa9a909f8c/html5/thumbnails/23.jpg)
Conclusion
A centralized security solution is more suitable for cloud-based services because it never requires the intervention of end users. However, the end user can protect the network by means of hardware and software based solutions, which are already implemented by their respective networks. With the centralized approach, the management of VM-VoIP services and the configuration of the cloud services for threats will be easy for the administrator. Moreover, the SLA-based agreement will also help cloud service providers prioritize the traffic. This proposed solution is good enough small number of VoIP users. However, to utilize VM-VoIP in a bigger environment with best of QoS services, security shield should be isolated from VM-VoIP.
![Page 24: Performance Evaluation of Virtualization of Real Time Server](https://reader036.vdocuments.mx/reader036/viewer/2022062722/563db81b550346aa9a909f8c/html5/thumbnails/24.jpg)
References1.Drutskoy, Dmitry, Eric Keller, and Jennifer Rexford. "Scalable network virtualization in software-defined networks." Internet Computing, IEEE 17, no. 2 (2013): 20-27.
2.Barker, Sean Kenneth, and Prashant Shenoy. "Empirical evaluation of latency-sensitive application performance in the cloud." In Proceedings of the first annual ACM SIGMM conference on Multimedia systems, pp. 35-46. ACM, 2010.
3.Rosenblum, Mendel, and Tal Garfinkel. "Virtual machine monitors: Current technology and future trends." Computer 38, no. 5 (2005): 39-47.
4.Salah, Khaled, Jose M. Alcaraz Calero, Sherali Zeadally, Sameera Al-Mulla, and Mohammed Alzaabi. "Using Cloud Computing to Implement a Security Overlay Network." IEEE security & privacy 11, no. 1 (2013): 44-53.
![Page 25: Performance Evaluation of Virtualization of Real Time Server](https://reader036.vdocuments.mx/reader036/viewer/2022062722/563db81b550346aa9a909f8c/html5/thumbnails/25.jpg)
Questions ?