Pub Date : 2017-05-01DOI: 10.23919/INM.2017.7987288
Estefanía Coronado, R. Riggio, Jose Miguel Villalón Millán, A. Garrido
The increasing demand for multimedia content and for live broadcasting is bringing renewed interest in multicast applications. In many cases, users access such streams using Wi-Fi networks. However, multicast over Wi-Fi poses several challenges including low-data rates and coexistence issues with regard to other unicast streams. Software Defined Networking (SDN) has recently emerged as a novel approach to network control and management. In this paper we present SDN@Play, a novel SDN-based solution for multicast rate-adaptation in Wi-Fi networks. The solution builds upon a new abstraction, named Transmission Policy which allows the SDN controller to reconfigure or replace a certain rate control policy if its optimal operating conditions are not met. An experimental evaluation carried out over a real-world testbed shows that this approach can deliver an improvement of up to 80% in terms of channel utilization compared to legacy 802.11 multicast. We release the entire implementation including the controller and the data-path under a permissive license for academic use.
{"title":"Programming abstractions for wireless multicasting in software-defined enterprise WLANs","authors":"Estefanía Coronado, R. Riggio, Jose Miguel Villalón Millán, A. Garrido","doi":"10.23919/INM.2017.7987288","DOIUrl":"https://doi.org/10.23919/INM.2017.7987288","url":null,"abstract":"The increasing demand for multimedia content and for live broadcasting is bringing renewed interest in multicast applications. In many cases, users access such streams using Wi-Fi networks. However, multicast over Wi-Fi poses several challenges including low-data rates and coexistence issues with regard to other unicast streams. Software Defined Networking (SDN) has recently emerged as a novel approach to network control and management. In this paper we present SDN@Play, a novel SDN-based solution for multicast rate-adaptation in Wi-Fi networks. The solution builds upon a new abstraction, named Transmission Policy which allows the SDN controller to reconfigure or replace a certain rate control policy if its optimal operating conditions are not met. An experimental evaluation carried out over a real-world testbed shows that this approach can deliver an improvement of up to 80% in terms of channel utilization compared to legacy 802.11 multicast. We release the entire implementation including the controller and the data-path under a permissive license for academic use.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123133620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-05-01DOI: 10.23919/INM.2017.7987381
J. Nobre, L. Granville
Critical networked services established between service providers and customers are expected to operate respecting Service Level Agreements (SLAs). An interesting possibility to monitor such SLAs is using active measurement mechanisms. However, these mechanisms are expensive in terms of network devices resource consumption and also increase the network load because of the injected traffic. In addition, if the number of SLA violations in a given time is higher than the number of available measurement sessions (common place in large and complex network infrastructures), certainly some violations will be missed. The current best practice, the observation of just a subset of network destinations driven by human administrators expertise, is error prone, does not scale well, and is ineffective on dynamic network conditions. This practice can lead to SLA violations being missed, which invariably affects the performance of several applications. In the present thesis, we advocate the use of Peer-to-Peer (P2P) technology to improve the detection of SLA violations. Such use is described using principles to control active measurement mechanisms. These principles are accomplished through strategies to activate measurement sessions. In this context, the thesis contains several contributions towards SLA monitoring, conceptually as well pragmatically. The findings show properties which improve the detection of SLA violations in terms of the number of detected violations and the adaptivity to network dynamics. We expect that such findings can lead to better SLA monitoring tools and methods.
{"title":"Decentralized detection of violations of Service Level Agreements using Peer-to-Peer technology","authors":"J. Nobre, L. Granville","doi":"10.23919/INM.2017.7987381","DOIUrl":"https://doi.org/10.23919/INM.2017.7987381","url":null,"abstract":"Critical networked services established between service providers and customers are expected to operate respecting Service Level Agreements (SLAs). An interesting possibility to monitor such SLAs is using active measurement mechanisms. However, these mechanisms are expensive in terms of network devices resource consumption and also increase the network load because of the injected traffic. In addition, if the number of SLA violations in a given time is higher than the number of available measurement sessions (common place in large and complex network infrastructures), certainly some violations will be missed. The current best practice, the observation of just a subset of network destinations driven by human administrators expertise, is error prone, does not scale well, and is ineffective on dynamic network conditions. This practice can lead to SLA violations being missed, which invariably affects the performance of several applications. In the present thesis, we advocate the use of Peer-to-Peer (P2P) technology to improve the detection of SLA violations. Such use is described using principles to control active measurement mechanisms. These principles are accomplished through strategies to activate measurement sessions. In this context, the thesis contains several contributions towards SLA monitoring, conceptually as well pragmatically. The findings show properties which improve the detection of SLA violations in terms of the number of detected violations and the adaptivity to network dynamics. We expect that such findings can lead to better SLA monitoring tools and methods.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124462996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-05-01DOI: 10.23919/INM.2017.7987393
N. Gray, T. Zinner, P. Tran-Gia
Software-defined Networking (SDN) provides an increased flexibility and cost savings by separating the data from the control plane. Despite these benefits, this separation also results in a greater attack surface as new devices and protocols are deployed. OpenFlow is one of these protocols and enables the communication between the switch and the controller. Ideally this connection takes place over an encrypted TLS channel, but as this feature is marked optional, it is not supported by all devices. This allows an attacker to eavesdrop and alter the communication, hence resulting in a comprised network. In this work, we demonstrate a new approach for authentication based on device fingerprinting to enhance the security in scenarios, where cryptographic mechanisms are unavailable.
{"title":"Enhancing SDN security by device fingerprinting","authors":"N. Gray, T. Zinner, P. Tran-Gia","doi":"10.23919/INM.2017.7987393","DOIUrl":"https://doi.org/10.23919/INM.2017.7987393","url":null,"abstract":"Software-defined Networking (SDN) provides an increased flexibility and cost savings by separating the data from the control plane. Despite these benefits, this separation also results in a greater attack surface as new devices and protocols are deployed. OpenFlow is one of these protocols and enables the communication between the switch and the controller. Ideally this connection takes place over an encrypted TLS channel, but as this feature is marked optional, it is not supported by all devices. This allows an attacker to eavesdrop and alter the communication, hence resulting in a comprised network. In this work, we demonstrate a new approach for authentication based on device fingerprinting to enhance the security in scenarios, where cryptographic mechanisms are unavailable.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116952791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-05-01DOI: 10.23919/INM.2017.7987344
Guizhen Ma, Yang Yang, Xue-song Qiu, Zhipeng Gao, He Li
Fault-tolerant topology control is a critical problem in WSNs. It is important for improving network lifetime and reliability. In this paper, we present a novel algorithm FTMRT, which ensures Fault Tolerance by constructing a Multi-Routing Tree. We firstly construct a multi-routing tree of the initial topology, which ensures there are at least k-disjoint paths from each sensor to the set of supernodes. And then each sensor adjusts its transmission power according to the multi-routing tree to form the fault-tolerant network topology. In the topology maintenance phase, topology reconstruction is invoked each time there are some node fail and the supernode connectivity is broken. The effectiveness of the proposed algorithm is validated through simulation experiments.
{"title":"Fault-tolerant topology control for heterogeneous wireless sensor networks using Multi-Routing Tree","authors":"Guizhen Ma, Yang Yang, Xue-song Qiu, Zhipeng Gao, He Li","doi":"10.23919/INM.2017.7987344","DOIUrl":"https://doi.org/10.23919/INM.2017.7987344","url":null,"abstract":"Fault-tolerant topology control is a critical problem in WSNs. It is important for improving network lifetime and reliability. In this paper, we present a novel algorithm FTMRT, which ensures Fault Tolerance by constructing a Multi-Routing Tree. We firstly construct a multi-routing tree of the initial topology, which ensures there are at least k-disjoint paths from each sensor to the set of supernodes. And then each sensor adjusts its transmission power according to the multi-routing tree to form the fault-tolerant network topology. In the topology maintenance phase, topology reconstruction is invoked each time there are some node fail and the supernode connectivity is broken. The effectiveness of the proposed algorithm is validated through simulation experiments.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124826580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-05-01DOI: 10.23919/INM.2017.7987388
E. Zeydan, A. S. Tan, Gokhan Ayhan, M. Koca
In this demo, we demonstrate the integration of radio access network (RAN)/Software-Defined Networking (SDN) controller with a connectivity management platform designed for mobile wireless networks. This is an architecture designed throughout the EU Celtic-Plus project SIGMONA1. OpenDaylight based RAN/SDN controller and the application server are capable of collecting infrastructure and client related parameters from OpenFlow enabled switches and Android based phones respectively. The decision on the best access network selection is computed at the application server using a Multiple Attribute Decision Making (MADM) algorithm and instructed back to Android-based mobile client for execution of access network selection.
{"title":"A RAN/SDN controller based connectivity management platform for Mobile Service Providers","authors":"E. Zeydan, A. S. Tan, Gokhan Ayhan, M. Koca","doi":"10.23919/INM.2017.7987388","DOIUrl":"https://doi.org/10.23919/INM.2017.7987388","url":null,"abstract":"In this demo, we demonstrate the integration of radio access network (RAN)/Software-Defined Networking (SDN) controller with a connectivity management platform designed for mobile wireless networks. This is an architecture designed throughout the EU Celtic-Plus project SIGMONA1. OpenDaylight based RAN/SDN controller and the application server are capable of collecting infrastructure and client related parameters from OpenFlow enabled switches and Android based phones respectively. The decision on the best access network selection is computed at the application server using a Multiple Attribute Decision Making (MADM) algorithm and instructed back to Android-based mobile client for execution of access network selection.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125969647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-05-01DOI: 10.23919/INM.2017.7987443
Maja Sulovic, C. Marquezan, A. Hecker
One of the key functionalities in EPC (Evolved packet Core) is Mobility Management (MM), which provides procedures for service continuity as the mobile devices (UE) move across the network. In a quest for more flexibility of MM, recent studies suggested to map MM procedures to SDN applications in an SDN controller. So far, these proposals investigated and showed how path switching during handover, one of the procedures of MM, is achieved in such an SDN-based Mobile Core Network (MCN). However, Location Management (LM) procedures, such as paging, are equally important. In this paper, we address this gap. We notably design and implement SDN-based UE state management and paging procedure for MCN. Our design only uses the data from the SDN controller, such as UE connectivity and flow information, and defines a new set of UE states: deregistered, idle, and active. We introduce new, dynamically configurable UE inactivity timers that regulate the transitions among these states. With this, we implement a purely SDN-based paging procedure capable of bringing a UE into a connected state on request, e.g. to deliver the downlink traffic. The experiments with our implementation on Floodlight SDN controller under different network loads and configuration settings for UE inactivity timers in Mininet demonstrate the practical feasibility of an SDN-based LM. Further, we show how different UE inactivity timer values can flexibly regulate the amount of paging. All in all, our results suggest that, leveraging the programmability provided by SDN, operators can flexibly install and use LM SDN apps with different settings to tailor the amount of paging according to the specific UE or user application activity patterns and its needs.
{"title":"Towards Location Management in SDN-based MCN","authors":"Maja Sulovic, C. Marquezan, A. Hecker","doi":"10.23919/INM.2017.7987443","DOIUrl":"https://doi.org/10.23919/INM.2017.7987443","url":null,"abstract":"One of the key functionalities in EPC (Evolved packet Core) is Mobility Management (MM), which provides procedures for service continuity as the mobile devices (UE) move across the network. In a quest for more flexibility of MM, recent studies suggested to map MM procedures to SDN applications in an SDN controller. So far, these proposals investigated and showed how path switching during handover, one of the procedures of MM, is achieved in such an SDN-based Mobile Core Network (MCN). However, Location Management (LM) procedures, such as paging, are equally important. In this paper, we address this gap. We notably design and implement SDN-based UE state management and paging procedure for MCN. Our design only uses the data from the SDN controller, such as UE connectivity and flow information, and defines a new set of UE states: deregistered, idle, and active. We introduce new, dynamically configurable UE inactivity timers that regulate the transitions among these states. With this, we implement a purely SDN-based paging procedure capable of bringing a UE into a connected state on request, e.g. to deliver the downlink traffic. The experiments with our implementation on Floodlight SDN controller under different network loads and configuration settings for UE inactivity timers in Mininet demonstrate the practical feasibility of an SDN-based LM. Further, we show how different UE inactivity timer values can flexibly regulate the amount of paging. All in all, our results suggest that, leveraging the programmability provided by SDN, operators can flexibly install and use LM SDN apps with different settings to tailor the amount of paging according to the specific UE or user application activity patterns and its needs.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122172313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-05-01DOI: 10.23919/INM.2017.7987427
M. Varela, Toni Mäki
When dealing with Quality of Experience (QoE) and in particular perceptual quality assessment and modeling, averaging is a common occurrence. For instance, the most commonly used measure of QoE is the aptly-called Mean Opinion Score (MOS), which is intended to represent an idealized average subject's rating of the quality. Another form of averaging occurs when choosing and preparing the samples used for the assessment, which are supposed to be representative of an average viewing situation. This leads to nice, smooth scalar representations of quality, but at the same time, it leads to a loss of information. In this paper we present a first step towards working with all the information available in an explicit way, rather than averaging it away. We do so in the context of constructing layered quality models for HTTP video streaming (using Dynamic Adaptive HTTP Streaming — DASH, excluding its adaptation feature at this stage), mapping network-level QoS measurements to probability distributions of different MOS values for a given set of conditions.
{"title":"Embracing uncertainty: A probabilistic view of HTTP video quality","authors":"M. Varela, Toni Mäki","doi":"10.23919/INM.2017.7987427","DOIUrl":"https://doi.org/10.23919/INM.2017.7987427","url":null,"abstract":"When dealing with Quality of Experience (QoE) and in particular perceptual quality assessment and modeling, averaging is a common occurrence. For instance, the most commonly used measure of QoE is the aptly-called Mean Opinion Score (MOS), which is intended to represent an idealized average subject's rating of the quality. Another form of averaging occurs when choosing and preparing the samples used for the assessment, which are supposed to be representative of an average viewing situation. This leads to nice, smooth scalar representations of quality, but at the same time, it leads to a loss of information. In this paper we present a first step towards working with all the information available in an explicit way, rather than averaging it away. We do so in the context of constructing layered quality models for HTTP video streaming (using Dynamic Adaptive HTTP Streaming — DASH, excluding its adaptation feature at this stage), mapping network-level QoS measurements to probability distributions of different MOS values for a given set of conditions.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125841102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-05-01DOI: 10.23919/INM.2017.7987438
Catalin Gosman, C. Dobre, Florin Pop
Intelligent Transportation Systems(ITS) demonstrate innovative services relating to different modes of transport and traffic management. For this, ITS rely on data collected by volunteer users in traffic. The aggregated information collected periodically offers the possibility to learn general statistics and provides ITS users with a common traffic view. For user's sensitive data, it is desired to hide individual values from other participants, but also from the ITS data aggregator, because this could disclose sensitive information. Therefore, we propose a schema for privacy-preserving aggregation based on symmetric cryptography of time-series data applicable for ITS applications.
{"title":"Privacy-preserving data aggregation in Intelligent Transportation Systems","authors":"Catalin Gosman, C. Dobre, Florin Pop","doi":"10.23919/INM.2017.7987438","DOIUrl":"https://doi.org/10.23919/INM.2017.7987438","url":null,"abstract":"Intelligent Transportation Systems(ITS) demonstrate innovative services relating to different modes of transport and traffic management. For this, ITS rely on data collected by volunteer users in traffic. The aggregated information collected periodically offers the possibility to learn general statistics and provides ITS users with a common traffic view. For user's sensitive data, it is desired to hide individual values from other participants, but also from the ITS data aggregator, because this could disclose sensitive information. Therefore, we propose a schema for privacy-preserving aggregation based on symmetric cryptography of time-series data applicable for ITS applications.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131142414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The current developments of software defined networking (SDN) paradigm provide a flexible architecture for network control and management, in the cost of deploying new hardwares by replacing the existing routing infrastructure. Further, the centralized controller architecture of SDN makes the network prone to single point failure and creates performance bottleneck. To avoid these issues and to support network manageability over the existing network infrastructure, we develop Flipper in this paper, that uses only software augmentation to convert existing off-the-shelf routers to network policy design and enforcement points (PDEP). We develop a distributed self-stabilized architecture for dynamic role change of network devices from routers to PDEPs, and make the architecture fault-tolerant. The performance of Flipper has been analyzed from both simulation over synthetic networks, and emulation over real network protocol stacks, and we observe that Flipper is scalable, flexible and fail-safe that can significantly boost up the manageability of existing network infrastructure.
{"title":"FLIPPER: Fault-tolerant distributed network management and control","authors":"Subhrendu Chattopadhyay, Niladri Sett, Sukumar Nandi, Sandip Chakraborty","doi":"10.23919/INM.2017.7987307","DOIUrl":"https://doi.org/10.23919/INM.2017.7987307","url":null,"abstract":"The current developments of software defined networking (SDN) paradigm provide a flexible architecture for network control and management, in the cost of deploying new hardwares by replacing the existing routing infrastructure. Further, the centralized controller architecture of SDN makes the network prone to single point failure and creates performance bottleneck. To avoid these issues and to support network manageability over the existing network infrastructure, we develop Flipper in this paper, that uses only software augmentation to convert existing off-the-shelf routers to network policy design and enforcement points (PDEP). We develop a distributed self-stabilized architecture for dynamic role change of network devices from routers to PDEPs, and make the architecture fault-tolerant. The performance of Flipper has been analyzed from both simulation over synthetic networks, and emulation over real network protocol stacks, and we observe that Flipper is scalable, flexible and fail-safe that can significantly boost up the manageability of existing network infrastructure.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"42 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132867234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-05-01DOI: 10.23919/INM.2017.7987360
Tatsuji Miyamoto, M. Miyazawa, M. Hayashi
Maintainability of operation workflow is a critical issue for a telecom operator especially in a multi-vendor system environment. We demonstrate the implementation of an automated fault recovery workflow that is sustainable, versatile and applicable for fault management of both physical/virtual network functions.
{"title":"Demonstration of sustainable implementation-level workflow for automating NFV operation","authors":"Tatsuji Miyamoto, M. Miyazawa, M. Hayashi","doi":"10.23919/INM.2017.7987360","DOIUrl":"https://doi.org/10.23919/INM.2017.7987360","url":null,"abstract":"Maintainability of operation workflow is a critical issue for a telecom operator especially in a multi-vendor system environment. We demonstrate the implementation of an automated fault recovery workflow that is sustainable, versatile and applicable for fault management of both physical/virtual network functions.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"482 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133847555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}