首页 > 最新文献

2022 IEEE 8th International Conference on Network Softwarization (NetSoft)最新文献

英文 中文
Unavailability-Aware Backup Allocation Model for Middleboxes with Two-Stage Shared Protection 具有两阶段共享保护的中间件不可用感知备份分配模型
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844095
Kita Nozomi, Fujun He, E. Oki
Middleboxes work as software which runs on a general-purpose server by adopting a network function virtualization. The unavailability of middlebox is a key metric. The previous study considers allocating backup servers to middleboxes to reduce the unavailability. While it adopts shared protection to save backup capacity, resource sharing has not been sufficiently explored as each middlebox can only use one backup server. This paper presents a backup allocation model in which a function can be protected by two backup servers and a backup server can protect multiple functions under a shared protection strategy to minimize the maximum unavailability among functions. We use Markov chains to analyze the state transitions and make equilibrium-state equations. By solving them, we obtain the probability of each state of the allocation and compute an unavailability of function. We introduce two algorithms to examine the proposed model; one of them uses the performance bound of the maximum unavailability which is analyzed in this paper. Numerical results show that the proposed model reduces the maximum unavailability by 13.9-51.2% compared to a baseline model that allocates one backup server for each middlebox in our examined cases.
中间件是通过采用网络功能虚拟化在通用服务器上运行的软件。中间盒的不可用性是一个关键指标。先前的研究考虑将备份服务器分配到中间盒以减少不可用性。虽然采用了共享保护来节省备份容量,但由于每个中间盒只能使用一台备份服务器,资源共享没有得到充分的开发。本文提出了一个备份分配模型,其中一个功能可以由两个备份服务器保护,一个备份服务器可以在共享保护策略下保护多个功能,以最小化功能之间的最大不可用性。我们用马尔可夫链来分析状态转移,并建立平衡状态方程。通过求解这些问题,我们得到了分配的各个状态的概率,并计算出不可用函数。我们引入了两种算法来检验所提出的模型;其中一种方法采用了最大不可用性的性能界,本文对其进行了分析。数值结果表明,在我们所研究的案例中,与为每个中间盒分配一个备份服务器的基线模型相比,所提出的模型将最大不可用性降低了13.9-51.2%。
{"title":"Unavailability-Aware Backup Allocation Model for Middleboxes with Two-Stage Shared Protection","authors":"Kita Nozomi, Fujun He, E. Oki","doi":"10.1109/NetSoft54395.2022.9844095","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844095","url":null,"abstract":"Middleboxes work as software which runs on a general-purpose server by adopting a network function virtualization. The unavailability of middlebox is a key metric. The previous study considers allocating backup servers to middleboxes to reduce the unavailability. While it adopts shared protection to save backup capacity, resource sharing has not been sufficiently explored as each middlebox can only use one backup server. This paper presents a backup allocation model in which a function can be protected by two backup servers and a backup server can protect multiple functions under a shared protection strategy to minimize the maximum unavailability among functions. We use Markov chains to analyze the state transitions and make equilibrium-state equations. By solving them, we obtain the probability of each state of the allocation and compute an unavailability of function. We introduce two algorithms to examine the proposed model; one of them uses the performance bound of the maximum unavailability which is analyzed in this paper. Numerical results show that the proposed model reduces the maximum unavailability by 13.9-51.2% compared to a baseline model that allocates one backup server for each middlebox in our examined cases.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123608247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
GOX: Towards a Scalable Graph Database-Driven SDN Controller 面向可伸缩图形数据库驱动的SDN控制器
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844075
Fetia Bannour, Stefania Dumbrava, Alex Danduran-Lembezat
The Software-Defined Networking (SDN) paradigm relies on decoupling the control and data planes, and logically centralizing SDN control to enable direct network programming via open interfaces. New abstractions are thus needed in a bid to rethink the traditional networking approach and create new opportunities for management and automation. We demonstrate the GOX controller, proposing a novel graph abstraction of the network topology in real time using the scalable Neo4j graph database. Our proof-of-concept was evaluated for a forwarding application designed for GOX. Compared to POX’s model, GOX shows better performance and scalability on synthetic topologies and real-world topologies from the Internet Topology Zoo.
软件定义网络(SDN)范例依赖于控制平面和数据平面的解耦,并在逻辑上集中SDN控制,从而通过开放接口实现直接的网络编程。因此,需要新的抽象来重新思考传统的网络方法,并为管理和自动化创造新的机会。我们演示了GOX控制器,使用可扩展的Neo4j图形数据库提出了一种新的网络拓扑的实时图形抽象。我们的概念验证是为GOX设计的转发应用程序进行评估的。与POX的模型相比,GOX在Internet Topology Zoo的合成拓扑和实际拓扑上显示出更好的性能和可伸缩性。
{"title":"GOX: Towards a Scalable Graph Database-Driven SDN Controller","authors":"Fetia Bannour, Stefania Dumbrava, Alex Danduran-Lembezat","doi":"10.1109/NetSoft54395.2022.9844075","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844075","url":null,"abstract":"The Software-Defined Networking (SDN) paradigm relies on decoupling the control and data planes, and logically centralizing SDN control to enable direct network programming via open interfaces. New abstractions are thus needed in a bid to rethink the traditional networking approach and create new opportunities for management and automation. We demonstrate the GOX controller, proposing a novel graph abstraction of the network topology in real time using the scalable Neo4j graph database. Our proof-of-concept was evaluated for a forwarding application designed for GOX. Compared to POX’s model, GOX shows better performance and scalability on synthetic topologies and real-world topologies from the Internet Topology Zoo.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126284921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a Fully Automated System for Testing and Validating NetApps 迈向测试和验证NetApps的全自动系统
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844037
Rafael Direito, D. Gomes, Rui L. Aguiar
5G technologies provide several advancements regarding low latency and high bandwidth network scenarios, thus enabling new vertical use cases. Nonetheless, the lack of testing and validation mechanisms for NFV-based services poses a severe challenge in reducing their time to market. In this work we showcase a service to automate the validation of 5G NetApps, thus striving towards reducing the time to market of these applications, and introducing a new layer of trust in their reliability and availability.
5G技术在低延迟和高带宽网络场景方面提供了多项进步,从而实现了新的垂直用例。然而,基于nfv的服务缺乏测试和验证机制,这对缩短其上市时间构成了严峻的挑战。在这项工作中,我们展示了一种自动化验证5G NetApps的服务,从而努力缩短这些应用程序的上市时间,并在其可靠性和可用性方面引入新的信任层。
{"title":"Towards a Fully Automated System for Testing and Validating NetApps","authors":"Rafael Direito, D. Gomes, Rui L. Aguiar","doi":"10.1109/NetSoft54395.2022.9844037","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844037","url":null,"abstract":"5G technologies provide several advancements regarding low latency and high bandwidth network scenarios, thus enabling new vertical use cases. Nonetheless, the lack of testing and validation mechanisms for NFV-based services poses a severe challenge in reducing their time to market. In this work we showcase a service to automate the validation of 5G NetApps, thus striving towards reducing the time to market of these applications, and introducing a new layer of trust in their reliability and availability.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127749180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
TPC Co-Chairs TPC联席主席
Pub Date : 2022-06-27 DOI: 10.1109/netsoft54395.2022.9844080
{"title":"TPC Co-Chairs","authors":"","doi":"10.1109/netsoft54395.2022.9844080","DOIUrl":"https://doi.org/10.1109/netsoft54395.2022.9844080","url":null,"abstract":"","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126254418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Application-Aware Provisioning of Security Services with Kubernetes 利用Kubernetes实现应用感知的安全服务供应
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844023
R. D. Corin, Silvio Cretti, T. Catena, Simone Magnani, D. Siracusa
In network security, Network Function Virtualization can be exploited to implement flexible security services tailored to specific user needs. However, in practice this is hard to achieve due to the limitations of reference software platforms, such as Kubernetes, which are designed to orchestrate cloud-native services. In this work, we complement Kubernetes with a state-of-the-art algorithm for application-aware provisioning of security services. We demonstrate that the proposed solution improves basic provisioning mechanisms, such as the default Kubernetes scheduler, in terms of Quality of Service and security guarantees for the users.
在网络安全领域,可以利用网络功能虚拟化技术,根据用户的具体需求,实现灵活的安全服务。然而,在实践中,由于参考软件平台(如Kubernetes)的限制,这很难实现,这些平台旨在编排云原生服务。在这项工作中,我们用最先进的算法来补充Kubernetes,用于应用程序感知的安全服务供应。我们证明了提出的解决方案在服务质量和用户安全保障方面改进了基本的供应机制,例如默认的Kubernetes调度器。
{"title":"Towards Application-Aware Provisioning of Security Services with Kubernetes","authors":"R. D. Corin, Silvio Cretti, T. Catena, Simone Magnani, D. Siracusa","doi":"10.1109/NetSoft54395.2022.9844023","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844023","url":null,"abstract":"In network security, Network Function Virtualization can be exploited to implement flexible security services tailored to specific user needs. However, in practice this is hard to achieve due to the limitations of reference software platforms, such as Kubernetes, which are designed to orchestrate cloud-native services. In this work, we complement Kubernetes with a state-of-the-art algorithm for application-aware provisioning of security services. We demonstrate that the proposed solution improves basic provisioning mechanisms, such as the default Kubernetes scheduler, in terms of Quality of Service and security guarantees for the users.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128193380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Secure and Optimized Cross-Slice Communication Establishment 面向安全优化的横片通信建立
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844063
George Papathanail, Ioannis Dimolitsas, Ioakeim Fotoglou, Dimitrios Dechouniotis, S. Papavassiliou, Panagiotis Papadimitriou
Network slicing has been at the forefront of 5G network research, with various slicing orchestration architectures seeking to reap the benefits of slicing for the enhanced performance and reliability of 5G (and beyond) network services. In this context, cross-slice communication (CSC) has drawn significant attention, since CSC can foster interactions among services deployed in co-located slices, lowering the barrier for the consumption of services.To capitalize the benefits of CSC (e.g., reduced latency and cost), CSC should be established with the highest degree of co-location and also in a secure and policy-compliant manner. To this end, we present an orchestration framework that fulfills all main technical requirements for CSC instantiation. In this respect, we elaborate on the CSC instantiation workflows and shed light into the cross-layer interactions that span our proposed CSC orchestrator, the Network Function Virtualization Orchestrator (NFVO) and the Virtualized Infrastructure Manager (VIM). Our experimental results indicate that our proposed CSC orchestration framework introduces a negligible performance overhead and also incurs a minimal latency inflation compared to a direct form of inter-slice communication without any provision for security and resource isolation.
网络切片一直处于5G网络研究的前沿,各种切片编排架构都在寻求从切片中获益,以增强5G(及以后)网络服务的性能和可靠性。在这种情况下,交叉片通信(CSC)引起了极大的关注,因为CSC可以促进部署在同一位置片中的服务之间的交互,从而降低了服务消费的障碍。为了充分利用CSC的好处(例如,减少延迟和成本),CSC应该以最高程度的协同定位建立,并且以安全和符合策略的方式建立。为此,我们提出了一个满足CSC实例化所有主要技术需求的编排框架。在这方面,我们详细阐述了CSC实例化工作流程,并阐明了跨我们提出的CSC协调器、网络功能虚拟化协调器(NFVO)和虚拟化基础设施管理器(VIM)的跨层交互。我们的实验结果表明,与不提供任何安全性和资源隔离的直接片间通信形式相比,我们提出的CSC编排框架引入的性能开销可以忽略不计,并且还会导致最小的延迟膨胀。
{"title":"Towards Secure and Optimized Cross-Slice Communication Establishment","authors":"George Papathanail, Ioannis Dimolitsas, Ioakeim Fotoglou, Dimitrios Dechouniotis, S. Papavassiliou, Panagiotis Papadimitriou","doi":"10.1109/NetSoft54395.2022.9844063","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844063","url":null,"abstract":"Network slicing has been at the forefront of 5G network research, with various slicing orchestration architectures seeking to reap the benefits of slicing for the enhanced performance and reliability of 5G (and beyond) network services. In this context, cross-slice communication (CSC) has drawn significant attention, since CSC can foster interactions among services deployed in co-located slices, lowering the barrier for the consumption of services.To capitalize the benefits of CSC (e.g., reduced latency and cost), CSC should be established with the highest degree of co-location and also in a secure and policy-compliant manner. To this end, we present an orchestration framework that fulfills all main technical requirements for CSC instantiation. In this respect, we elaborate on the CSC instantiation workflows and shed light into the cross-layer interactions that span our proposed CSC orchestrator, the Network Function Virtualization Orchestrator (NFVO) and the Virtualized Infrastructure Manager (VIM). Our experimental results indicate that our proposed CSC orchestration framework introduces a negligible performance overhead and also incurs a minimal latency inflation compared to a direct form of inter-slice communication without any provision for security and resource isolation.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129979828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamic VNF Placement in 5G Edge Nodes 5G边缘节点动态VNF布局
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844093
D. Harris, D. Raz
The ongoing transition into 5G networks is enabled in part by the combination of NFV (Network Function Virtualization) and MEC (Multi-access Edge Computing), two promising paradigms that allow executing ultra-low-latency network services on edge nodes, physically closer to the clients. However, orchestrating this complex distributed environment and especially provisioning services in a timely manner, in order to address the dynamic workload, remained a big challenge. In this paper we address this challenge and study ways to dynamically place network functions at edge nodes, across the network, in a way that maximizes client satisfaction, we measure this satisfaction by the number of clients that received their desired services in a manner that holds these required services low-latency demands. In order to balance between the dynamic workload and the non-negligible cost of replacing the functions at the edge, we partition the time into epochs and reassign VNFs (Virtual Network Functions) only at the beginning of each epoch. Our theoretical analysis, based on studying a simple variant of the online problem, shows that the data from the last epoch can provide guarantees on the expected performance. We then evaluate the actual performance of our algorithm based on extensive simulations over real data. The results indicate that our new algorithm can be deployed in a realistic 5G setting, generating an overall dynamic solution that outperforms currently used methods.
正在进行的向5G网络的过渡部分是由NFV(网络功能虚拟化)和MEC(多访问边缘计算)的结合实现的,这两种有前途的范式允许在边缘节点上执行超低延迟的网络服务,物理上更靠近客户端。然而,为了处理动态工作负载,编排这种复杂的分布式环境,特别是及时地提供服务,仍然是一个巨大的挑战。在本文中,我们解决了这一挑战,并研究了以最大化客户满意度的方式在整个网络的边缘节点动态放置网络功能的方法,我们通过以保持这些所需服务低延迟需求的方式接收其所需服务的客户端数量来衡量这种满意度。为了平衡动态工作负载和替换边缘函数的不可忽略的成本,我们将时间划分为多个epoch,并仅在每个epoch的开始重新分配vnf(虚拟网络函数)。我们的理论分析,基于对在线问题的一个简单变体的研究,表明从最后一个时代的数据可以提供对预期性能的保证。然后,我们基于对真实数据的广泛模拟来评估算法的实际性能。结果表明,我们的新算法可以部署在现实的5G环境中,生成优于当前使用方法的整体动态解决方案。
{"title":"Dynamic VNF Placement in 5G Edge Nodes","authors":"D. Harris, D. Raz","doi":"10.1109/NetSoft54395.2022.9844093","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844093","url":null,"abstract":"The ongoing transition into 5G networks is enabled in part by the combination of NFV (Network Function Virtualization) and MEC (Multi-access Edge Computing), two promising paradigms that allow executing ultra-low-latency network services on edge nodes, physically closer to the clients. However, orchestrating this complex distributed environment and especially provisioning services in a timely manner, in order to address the dynamic workload, remained a big challenge. In this paper we address this challenge and study ways to dynamically place network functions at edge nodes, across the network, in a way that maximizes client satisfaction, we measure this satisfaction by the number of clients that received their desired services in a manner that holds these required services low-latency demands. In order to balance between the dynamic workload and the non-negligible cost of replacing the functions at the edge, we partition the time into epochs and reassign VNFs (Virtual Network Functions) only at the beginning of each epoch. Our theoretical analysis, based on studying a simple variant of the online problem, shows that the data from the last epoch can provide guarantees on the expected performance. We then evaluate the actual performance of our algorithm based on extensive simulations over real data. The results indicate that our new algorithm can be deployed in a realistic 5G setting, generating an overall dynamic solution that outperforms currently used methods.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134172917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Challenges and Opportunities in Green Networking 绿色网络的挑战与机遇
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844020
A. Clemm, C. Westphal
Reducing mankind’s carbon footprint and becoming more sustainable is rapidly becoming one of the main challenges of our age. The networking industry needs to respond to those challenges not only by enabling applications that allow users to save energy (such as, replacing travel with teleconferencing), but also by making networking technology itself significantly more energy-efficient. As a result, the aspect of minimizing network power consumption is rapidly increasing in importance. This position paper aims to articulate opportunities where energy efficiency of networks can be improved, to point out the associated technical challenges, and to identify corresponding research challenges.
减少人类的碳足迹,变得更加可持续,正迅速成为我们这个时代的主要挑战之一。网络行业需要应对这些挑战,不仅要启用允许用户节省能源的应用程序(例如,用电话会议代替旅行),还要使网络技术本身更加节能。因此,最小化网络功耗方面的重要性迅速增加。本立场文件旨在阐明网络能源效率可以提高的机会,指出相关的技术挑战,并确定相应的研究挑战。
{"title":"Challenges and Opportunities in Green Networking","authors":"A. Clemm, C. Westphal","doi":"10.1109/NetSoft54395.2022.9844020","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844020","url":null,"abstract":"Reducing mankind’s carbon footprint and becoming more sustainable is rapidly becoming one of the main challenges of our age. The networking industry needs to respond to those challenges not only by enabling applications that allow users to save energy (such as, replacing travel with teleconferencing), but also by making networking technology itself significantly more energy-efficient. As a result, the aspect of minimizing network power consumption is rapidly increasing in importance. This position paper aims to articulate opportunities where energy efficiency of networks can be improved, to point out the associated technical challenges, and to identify corresponding research challenges.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134530461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
NLP4: An Architecture for Intent-Driven Data Plane Programmability 意图驱动数据平面可编程性的体系结构
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844035
Antonino Angi, Alessio Sacco, Flavio Esposito, G. Marchetto, A. Clemm
Translating high-level policies to lower-level network rules is one of the main goals of control or data plane network programmability. To further abstract requirements and propel automation in networking, several industries have proposed the paradigm of “network intent”. However, the translation from intents to low-level policies is considered critical to program data planes and other network elements, especially when dealing with P4-enabled switches. In this paper, we present NLP4, an architecture that helps translate intents, in the form of human language, into data-plane programs, in the form of P4 rules. In particular, NLP4 uses Natural Language Processing (NLP) techniques to translate high-level human-language intents, a MultiLayer Perceptron (MLP) model for processing the NLP output and converting it into mid-level policy. An API then uses this information, which separates the intent from the network to generate commands readable by P4-enabled switches. Our initial prototype on a network emulator validates our architecture for a specific case: load profiling, demonstrating how even users with limited P4 expertise may customize their networks by merely specifying intents.
将高级策略转换为低级网络规则是控制或数据平面网络可编程性的主要目标之一。为了进一步抽象需求并推动网络自动化,一些行业提出了“网络意图”范式。然而,从意图到低级策略的转换被认为对编程数据平面和其他网络元素至关重要,特别是在处理启用p4的交换机时。在本文中,我们提出了NLP4,一个帮助将人类语言形式的意图翻译成P4规则形式的数据平面程序的体系结构。特别是,NLP4使用自然语言处理(NLP)技术来翻译高级人类语言意图,多层感知器(MLP)模型用于处理NLP输出并将其转换为中级策略。然后,API使用这些信息,将意图与网络分离,以生成启用p4的交换机可读的命令。我们在网络模拟器上的初始原型验证了我们针对特定案例的体系结构:负载分析,演示了即使是具有有限P4专业知识的用户也可以通过仅指定意图来定制他们的网络。
{"title":"NLP4: An Architecture for Intent-Driven Data Plane Programmability","authors":"Antonino Angi, Alessio Sacco, Flavio Esposito, G. Marchetto, A. Clemm","doi":"10.1109/NetSoft54395.2022.9844035","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844035","url":null,"abstract":"Translating high-level policies to lower-level network rules is one of the main goals of control or data plane network programmability. To further abstract requirements and propel automation in networking, several industries have proposed the paradigm of “network intent”. However, the translation from intents to low-level policies is considered critical to program data planes and other network elements, especially when dealing with P4-enabled switches. In this paper, we present NLP4, an architecture that helps translate intents, in the form of human language, into data-plane programs, in the form of P4 rules. In particular, NLP4 uses Natural Language Processing (NLP) techniques to translate high-level human-language intents, a MultiLayer Perceptron (MLP) model for processing the NLP output and converting it into mid-level policy. An API then uses this information, which separates the intent from the network to generate commands readable by P4-enabled switches. Our initial prototype on a network emulator validates our architecture for a specific case: load profiling, demonstrating how even users with limited P4 expertise may customize their networks by merely specifying intents.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114285173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CHIMA: a Framework for Network Services Deployment and Performance Assurance 中国:网络服务部署和性能保证框架
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844124
Elia Battiston, Daniele Moro, G. Verticale, A. Capone
Network Function Virtualization has dramatically increased the flexibility in the deployment of network services, however the execution of virtual functions on compute nodes equipped with general purpose hardware can result in worse performance compared to the middleboxes they aim to replace. The use of programmable network hardware to perform part of the processing at line rate can drastically increase the throughput while retaining the flexibility.This work presents a new framework, called CHIMA, which extends the capabilities of other frameworks proposed in the literature for the deployment of heterogeneous Service Function Chains (SFCs). Heterogeneous SFCs comprise a combination of virtual functions meant to be executed in containers running on general purpose hardware and of functions for programmable switches written using the P4 language. CHIMA exploits programmable data planes to perform real time monitoring of the services through In-band Network Telemetry and uses the collected information to guarantee the requested levels of performance by redeploying and rerouting sections that are affected by adverse conditions, allowing applications with critical requirements to be deployed as SFCs.The solution has been tested by emulating various topologies and services on the FOP4 platform with bmv2 switches. The analysis shows that the system is capable of detecting faults in the order of hundreds of milliseconds, and the overhead it causes in the process of redeployment is negligible compared to the startup time of functions. Measurements also reveal that the current bottleneck for the runtime relocation of heterogeneous functions is the redeployment and reconfiguration of P4 programs.
网络功能虚拟化极大地提高了网络服务部署的灵活性,但是,在配备通用硬件的计算节点上执行虚拟功能可能会导致性能比它们想要取代的中间件更差。使用可编程网络硬件以线速率执行部分处理可以在保持灵活性的同时大幅提高吞吐量。这项工作提出了一个名为china的新框架,它扩展了文献中提出的用于部署异构服务功能链(sfc)的其他框架的功能。异构sfc包括在通用硬件上运行的容器中执行的虚拟函数和使用P4语言编写的可编程交换机的函数的组合。中国电信利用可编程数据平面通过带内网络遥测技术对业务进行实时监控,并利用收集到的信息通过重新部署和重新路由受不利条件影响的部分来保证所要求的性能水平,从而允许将具有关键要求的应用程序部署为sfc。该解决方案已在FOP4平台上通过bmv2交换机模拟各种拓扑和服务进行了测试。分析表明,该系统能够检测到数百毫秒级的故障,与功能启动时间相比,它在重新部署过程中造成的开销可以忽略不计。测量结果还表明,异构函数运行时重定位的当前瓶颈是P4程序的重部署和重配置。
{"title":"CHIMA: a Framework for Network Services Deployment and Performance Assurance","authors":"Elia Battiston, Daniele Moro, G. Verticale, A. Capone","doi":"10.1109/NetSoft54395.2022.9844124","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844124","url":null,"abstract":"Network Function Virtualization has dramatically increased the flexibility in the deployment of network services, however the execution of virtual functions on compute nodes equipped with general purpose hardware can result in worse performance compared to the middleboxes they aim to replace. The use of programmable network hardware to perform part of the processing at line rate can drastically increase the throughput while retaining the flexibility.This work presents a new framework, called CHIMA, which extends the capabilities of other frameworks proposed in the literature for the deployment of heterogeneous Service Function Chains (SFCs). Heterogeneous SFCs comprise a combination of virtual functions meant to be executed in containers running on general purpose hardware and of functions for programmable switches written using the P4 language. CHIMA exploits programmable data planes to perform real time monitoring of the services through In-band Network Telemetry and uses the collected information to guarantee the requested levels of performance by redeploying and rerouting sections that are affected by adverse conditions, allowing applications with critical requirements to be deployed as SFCs.The solution has been tested by emulating various topologies and services on the FOP4 platform with bmv2 switches. The analysis shows that the system is capable of detecting faults in the order of hundreds of milliseconds, and the overhead it causes in the process of redeployment is negligible compared to the startup time of functions. Measurements also reveal that the current bottleneck for the runtime relocation of heterogeneous functions is the redeployment and reconfiguration of P4 programs.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114336604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2022 IEEE 8th International Conference on Network Softwarization (NetSoft)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1