Content Delivery Networks to the Home

CONTENT Delivery Networks (CDNs) are large distributed infrastructures of replica servers placed in strategic locations. They deliver content to end-users with reduced latency by replicating content on surrogate servers. However they face a major challenge when content is delivered to end-users accessing a same content in home settings: inefficient bandwidth usage in the access network. There are as many streams from the replica server as end-users accessing the same content.

A Context Aware, Lightweight, and Adaptive Authentication and Authorization

With increasing security risks in critical network infrastructures and emerging cloud technologies with shared capabilities, as well as increasing regulatory requirements on privacy, and data protection, there is a growing need for new approaches to manage security and privacy compliance.

A container Approach for Isolation in a Multi-Tenant Internet of Things Platform

Internet of Things (IoT) is a topic that many enterprises including Ericsson are pursuing to find innovative ways of providing a better and futuristic service to the clients. The large amount of CapEx and OpEx related to IoT infrastructure deployment and operation and humongous amount of data generated by IoT devices on the edge and in the center demands creative ways of sharing the IoT infrastructure between clients and effective ways of transferring/handling the generated/processed data.

Software Defined Security Orchestrator for Content Delivery Networks

Denial of service attacks deny a service, such as visiting a website or access to a network, by deliberately congesting the server or the network resources. In addition to delivering digital contents to end-users, content delivery networks (CDNs) are supposed to protect the content origins, such as Netflix or Amazon Video, against denial of service threats. However, denial of service attacks not only evade a CDN’s protection but also exploit its resources to damage content providers and the CDN itself. As such, traditional security mechanisms are no longer sufficient.

Congestion Control for Ethernet Networks supporting ICN and 5G

Ethernet networks are typically best effort networks where traffic flows may contribute on creating network congestion and lead the switches to start dropping packets randomly. This results in unstable network latency that some applications cannot tolerate, especially in the context of 5G networks where delay constraints are very tight.

Auditing in the cloud, Using OpenStack Congress

In a multi-tenant cloud environment, several tenants share the same physical resources. To ensure security of tenants’ data and process, appropriate security measures should be implemented by the cloud provider at multiple layers. Particularly, appropriate controls for end-to-end network isolation must be put in place. The proposed research project aims at elaborating innovative and efficient approaches and methods to audit end-to-end network isolation in the cloud.

Optical short reach interconnect

In the era of ‘BIG DATA’ and ‘Internet of Everything’, in order to provide the meshed data network with high capacity, advanced optical short reach interconnect technology are eagerly required. Silicon photonics has attracted intensive interest as it succeeded to provide highly energy efficient and broadband width integrated photonic devices on one chip to satisfy the requirements of optical interconnect. One of the problems is that silicon always requires an off-chip light source as silicon cannot emit efficiently.

Efficient Security Provisioning in the Cloud Based on Network Security Defense Patterns Using Service Chaining

In modern large data centers hundreds of thousands of VMs run simultaneously on thousands of physical computing nodes and networking nodes with different security policies. A centralized security architecture based on managing all their security policies in a few large security appliances would cause major security policy complexities and choke points in the cloud infrastructure. We will investigate to propose a network security pattern based approach for cloud infrastructure and its optimal placement in the cloud.

Extension of Capabilities for the Measurement Radio Propagation Parameters in Cluttered 5G Coverage Scenarios

Work conducted during this project will involve the extension and further development of existing methods for detailed measurement and subsequent modelling of radiowave propagation characteristics in indoor environments at extremely high frequencies. Results will enable the determination of the powers, time delays, and angles of arrival of waves incident upon a receive antenna over direct, reflected, and diffracted paths between a transmit antenna and a receive antenna.

Exploring cloud computing paradigm for Telecommunication Applications

For economical and simplification purpose Operators in the Telecom market are looking to move as much as possible of their infrastructure from traditional deployment to Cloud deployment. However Cloud deployment of IMS still need to be defined and developed. This project aims at bringing further the knowledge for such a deployment and helping guide future development for Ericsson. This project focuses on providing future directions for the development of an IP Multimedia System (IMS) in a Cloud environment.