• Aucun résultat trouvé

TAGIAIRE D EMANDE DE S

N/A
N/A
Protected

Academic year: 2022

Partager "TAGIAIRE D EMANDE DE S"

Copied!
2
0
0

Texte intégral

(1)

1/2

D EMANDE DE S TAGIAIRE

TUTEUR DE STAGE

Nom, Prénom Mathieu Bouet

Téléphone / E-mail 01 46 13 23 69 mathieu.bouet@thalesgroup.com

Direction DT/CEA/TAI

Numéro d’imputation du stagiaire Sous la forme de 2 fois 3 chiffres

DESCRIPTION DU STAGE

Durée / Dates souhaitées 6 mois

Lieu du Stage Gennevilliers

Famille professionnelle 04-Ingénierie Systèm

Présentation du service / Contexte Contenu (principales missions)

This project will be done in the Advanced Information Technologies (TAI) laboratory at Thales Communications & Security is involved in cutting-edge networking projects aiming at the specification, design and integration of security and telecommunication infrastructures. TAI personnel have expertise in several scientific fields: networking, especially for fixed and mobile IP network design, security architecture and information system. TAI is in charge of transferring technological building blocks to Thales’ business lines.

Middleboxes or network appliances like firewalls, proxies, ciphers and WAN optimizers have become an integral part of today's ISP and enterprise networks.

Middlebox functionalities are usually deployed on expensive and proprietary hardware that require trained personnel for deployment, configuration and maintenance. Moreover, the services provided by the network operator often require corresponding traffic to pass through a specific sequence of middleboxes for compliance with security and performance policies. This makes the middlebox deployment and maintenance tasks even more complicated.

Network Functions Virtualization (NFV) is an emerging and promising technology that is envisioned to overcome these challenges [1]. It proposes to move packet processing from dedicated hardware middleboxes to software running on commodity servers. In NFV terminology, software middleboxes are referred to as Virtualized Network Functions (VNFs). It is a challenging problem to determine the required number and placement of VNFs that optimizes network operational costs and utilization, without violating service level agreements. It is even more challenging to dynamically adapt the number of the VNFs and the routing of the flows to adapt to varying traffic and service requests. This problem is generally called the VNF chaining and orchestration problem.

INTITULE DU STAGE : Characterization of Virtual Network Functions chains in NFV

THALES COMMUNICATIONS &

SECURITY

(2)

2/2

The objective of this project is to study different optimization algorithms that have been proposed in the literature to chain VNFs, for example [2,3,4], and characterize the nodes that tend to host the virtual network functions. To this aim, we will use classic centralities from the graph theory and we will explore very recent centralities based on the game theory, for example SV-based betweenness [5].

References:

[1] ETSI ISG NFV - Network Functions Virtualisation – White Paper #3:

https://portal.etsi.org/Portals/0/TBpages/NFV/Docs/NFV_White_Paper3.pdf [2] Md. Faizul Bari, Shihabur Rahman Chowdhury, Reaz Ahmed, Raouf Boutaba,

“On Orchestrating Virtual Network Functions in NFV”, http://arxiv.org/abs/1503.06377 , 2015.

[3] M. Bouet, J. Leguay and V. Conan, “Cost-based placement of vDPI functions in NFV infrastructures”, in Proceedings of the IEEE Network Softwarization Conference (NetSoft 2015), April 2015.

[4] M. C. Luizelli, L. R. Bays, L. Buriol, M. P. Barcellos, and L. P Gaspary, “Piecing together the NFV provisioning puzzle: Efficient placement and chaining of virtual network functions”, in IFIP/IEEE Integrated Network Management Symposium (IM 2015), May 2015.

[5] Piotr L. Szczepański, Tomasz Michalak, and Talal Rahwan, “A new approach to betweenness centrality based on the Shapley Value”, in Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 1 (AAMAS '12), 2012.

PROFIL RECHERCHE Formation souhaitée

Ecoles ciblées

Ecole d'ingénieur Bac+5

Stage de fin d’études OUI NON

Compétences humaines et techniques : Outils, Langues, Logiciels …

 Good knowledge on computer networks (routing, traffic engineering, graph theory etc.)

 Good knowledge on operational research (Integer Linear Programming etc.)

 Good programming skills (Python, Java, R, CPLEX, etc.)

Références

Documents relatifs

Une des difficultés du problème est de prendre en compte la mobilité des nœuds (association/désassociation à la station de base, distribution géographique) Une

1/3 Les informations contenues dans ce document demeurent la propriété exclusive du groupe Thales et ne doivent pas être divulguées à l'extérieur du Groupe.. D

1/2 Les informations contenues dans ce document demeurent la propriété exclusive du groupe Thales et ne doivent pas être divulguées à l'extérieur du Groupe.. D

Le stage se déroulera dans le cadre d’un projet européen qui vise à tester plusieurs cas d’utilisation de drones qui couvrent les services eMBB, uRLLC et

CNS personnel have expertise in following scientific fields: networking, especially for fixed and mobile IP network design, wireless communication systems (relaying

Cependant, l’architecture REST, tout comme HTTP, ne peut être utilisée que dans le cas où une communication directe peut être établie entre le client et le serveur. Dans

1/2 Les informations contenues dans ce document demeurent la propriété exclusive du groupe Thales et ne doivent pas être divulguées à l'extérieur du Groupe.. D EMANDE DE

L’objectif du stage s’inscrit dans une démarche qui vise à mettre en œuvre notamment des mécanismes de détection et de remédiation à des attaques par déni de