Seminar on Internet Technologies (Summer 2016): Difference between revisions

Jump to navigation Jump to search
Line 56: Line 56:
| [http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6099519]
| [http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6099519]
|-
|-
| '''Towards a Pricing Model in NFV'''   
| '''Towards a Pricing Model in NFV (assigned to Mohammad Sahihi Benis)'''   
One of the untouched research areas in Network Function Virtualization (NFV) is Accounting Management. Your task is to first identify the current Management systems that used in Data centers and cloud computing environments and later to map what you think it might be useful in NFV area. You should support your statement with logical reasons so far. It is not required to conducted any empirical work.  
One of the untouched research areas in Network Function Virtualization (NFV) is Accounting Management. Your task is to first identify the current Management systems that used in Data centers and cloud computing environments and later to map what you think it might be useful in NFV area. You should support your statement with logical reasons so far. It is not required to conducted any empirical work.  
| [http://www.net.informatik.uni-goettingen.de/people/osamah_barakat Osamah Barakat]
| [http://www.net.informatik.uni-goettingen.de/people/osamah_barakat Osamah Barakat]
| [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7243304][http://store.elsevier.com/Cloud-Data-Centers-and-Cost-Modeling/Caesar-Wu/isbn-9780128014134/][http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7378433]
| [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7243304][http://store.elsevier.com/Cloud-Data-Centers-and-Cost-Modeling/Caesar-Wu/isbn-9780128014134/][http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7378433]
|-
|-
| '''What can NFV brings comparing to virtual machines in the security area?'''   
| '''What can NFV brings comparing to virtual machines in the security area?(assigned to Alireza Amiri)'''   
Another untouched area is security. Although ETSI had published couple of documents orgnizing the rcommendation regarding NFV operations, a detialed approches should be published to address multiple challenges in details. Your task is to identify the thread vector in NFV and compare it to what have been done in VMs world.  
Another untouched area is security. Although ETSI had published couple of documents orgnizing the rcommendation regarding NFV operations, a detialed approches should be published to address multiple challenges in details. Your task is to identify the thread vector in NFV and compare it to what have been done in VMs world.  
| [http://www.net.informatik.uni-goettingen.de/people/osamah_barakat Osamah Barakat]
| [http://www.net.informatik.uni-goettingen.de/people/osamah_barakat Osamah Barakat]