首页 > 最新文献

2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)最新文献

英文 中文
A Network Coding Approach to In-Band Control Traffic Sharing in Software Defined Networks 软件定义网络中带内控制业务共享的网络编码方法
Pub Date : 2018-06-01 DOI: 10.1109/NETSOFT.2018.8460027
Fayaz Akhtar, M. H. Rehmani, A. Davy
In-band southbound connectivity provides a cost-efficient way to share control traffic between the software-defined network controller and underlying forwarding devices; without having to worry about establishing and maintaining a separate transport network. However, the adoption of such a design also exposes the control plane traffic to non-negligible delay and losses; incurred from burdening a single transport network with an increased number of transmissions. These drawbacks can severely degrade network performance. For instance, when the requests in the form of control packets from switch-to-controller (or vice-versa) are dropped, the information may not get updated promptly and thus, the system would not behave as desired or in the worst case scenario can collapse altogether. To mitigate these constraints, in this paper, we propose the use of network coding which encourages information mixing as packets traverse the network. We show that network coding when applied to control plane traffic in an in-band design can help overcome losses due to congestion and link impairments. Evaluation results suggest that network coding aware in-band design can mitigate number of transmissions as well as total delay incurred by control packet losses.
带内南向连接提供了一种在软件定义的网络控制器和底层转发设备之间共享控制流量的经济有效的方法;而不必担心建立和维护一个单独的运输网络。然而,采用这种设计也使控制平面流量暴露于不可忽略的延迟和损失;由于增加传输数量而使单个传输网络负担过重而引起的。这些缺点会严重降低网络性能。例如,当从交换机到控制器(或反之亦然)的控制数据包形式的请求被丢弃时,信息可能无法及时更新,因此,系统将无法按照预期的方式运行,或者在最坏的情况下可能完全崩溃。为了减轻这些限制,在本文中,我们建议使用网络编码,当数据包穿越网络时鼓励信息混合。我们表明,当网络编码应用于带内设计中的控制平面流量时,可以帮助克服由于拥塞和链路损伤造成的损失。评估结果表明,网络编码感知带内设计可以减少由于控制包丢失而导致的传输次数和总延迟。
{"title":"A Network Coding Approach to In-Band Control Traffic Sharing in Software Defined Networks","authors":"Fayaz Akhtar, M. H. Rehmani, A. Davy","doi":"10.1109/NETSOFT.2018.8460027","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8460027","url":null,"abstract":"In-band southbound connectivity provides a cost-efficient way to share control traffic between the software-defined network controller and underlying forwarding devices; without having to worry about establishing and maintaining a separate transport network. However, the adoption of such a design also exposes the control plane traffic to non-negligible delay and losses; incurred from burdening a single transport network with an increased number of transmissions. These drawbacks can severely degrade network performance. For instance, when the requests in the form of control packets from switch-to-controller (or vice-versa) are dropped, the information may not get updated promptly and thus, the system would not behave as desired or in the worst case scenario can collapse altogether. To mitigate these constraints, in this paper, we propose the use of network coding which encourages information mixing as packets traverse the network. We show that network coding when applied to control plane traffic in an in-band design can help overcome losses due to congestion and link impairments. Evaluation results suggest that network coding aware in-band design can mitigate number of transmissions as well as total delay incurred by control packet losses.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125036553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Parsimonious Monitoring Approach for Link Bandwidth Estimation within SDN-based Networks 基于sdn的网络中链路带宽估计的一种简约监控方法
Pub Date : 2018-06-01 DOI: 10.1109/NETSOFT.2018.8459972
El-Fadel Bonfoh, Samir Medjiah, C. Chassot
Resource monitoring is a key task in network management. The concept of Software Defined Networking (SDN) allows taking benefits of the advantages of both active and passive monitoring techniques. However, this monitoring has a cost, hence the importance of the selection of the “key” switches to be interrogated and their polling frequency in order to reduce monitoring cost. This cost is expressed here in term of computing time. Monitoring of links can be used to determine the available bandwidth on each link, with the aim to meet the applicative QoS requirements based on appropriate routing. In this context, this paper first provides a formulation of the problem of choosing key switches as a vertex cover problem and proposes a heuristic method to solve the formulated problem. It then provides an implementation and a performance evaluation of the proposed algorithm within the Floodlight SDN controller. These performances are compared to those of the currently existing Floodlight monitoring module. Finally, we present one application of our proposed monitoring.
资源监控是网络管理中的一项关键任务。软件定义网络(SDN)的概念允许利用主动和被动监控技术的优势。但是,这种监视是有成本的,因此选择要查询的“键”开关及其轮询频率以减少监视成本是很重要的。这个成本是用计算时间表示的。可以使用链路监控来确定每个链路上的可用带宽,目的是基于适当的路由满足应用程序的QoS需求。在此背景下,本文首先给出了选择键开关问题作为顶点覆盖问题的公式,并提出了一种求解公式问题的启发式方法。然后提供了在泛光灯SDN控制器中提出的算法的实现和性能评估。这些性能与目前现有的泛光灯监控模块进行了比较。最后,我们介绍了我们提出的监测的一个应用。
{"title":"A Parsimonious Monitoring Approach for Link Bandwidth Estimation within SDN-based Networks","authors":"El-Fadel Bonfoh, Samir Medjiah, C. Chassot","doi":"10.1109/NETSOFT.2018.8459972","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8459972","url":null,"abstract":"Resource monitoring is a key task in network management. The concept of Software Defined Networking (SDN) allows taking benefits of the advantages of both active and passive monitoring techniques. However, this monitoring has a cost, hence the importance of the selection of the “key” switches to be interrogated and their polling frequency in order to reduce monitoring cost. This cost is expressed here in term of computing time. Monitoring of links can be used to determine the available bandwidth on each link, with the aim to meet the applicative QoS requirements based on appropriate routing. In this context, this paper first provides a formulation of the problem of choosing key switches as a vertex cover problem and proposes a heuristic method to solve the formulated problem. It then provides an implementation and a performance evaluation of the proposed algorithm within the Floodlight SDN controller. These performances are compared to those of the currently existing Floodlight monitoring module. Finally, we present one application of our proposed monitoring.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131849470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Pishahang: Joint Orchestration of Network Function Chains and Distributed Cloud Applications 网络功能链与分布式云应用的联合编排
Pub Date : 2018-06-01 DOI: 10.1109/NETSOFT.2018.8460134
Hadi Razzaghi Kouchaksaraei, Tobias Dierich, H. Karl
Developing cloud applications using a microservice architecture allows their functional blocks to be distributed and deployed on multiple Cloud infrastructures. This enables service providers to mix and match Cloud-based microservices and Virtual Network Functions (VNFs) that are provided by Network Function Virtualization (NFV). Provisioning complex services containing VNFs and Cloud-based microservices across NFV and cloud infrastructures can enhance service quality, reduce latency, and optimise cost. This can be provided by an orchestration system that can handle cross-ecosystem dependencies. To this end, we implemented Pishahang that is a framework for jointly managing and orchestrating virtual network functions and Cloud-based microservices. During the demo, we deploy several complex services to demonstrate features provided by Pishahang to support management and orchestration of complex services.
使用微服务架构开发云应用程序允许将其功能块分布并部署在多个云基础设施上。这使得服务提供商能够混合和匹配基于云的微服务和网络功能虚拟化(NFV)提供的虚拟网络功能(VNFs)。跨NFV和云基础设施提供包含VNFs和基于云的微服务的复杂服务可以提高服务质量、减少延迟并优化成本。这可以由能够处理跨生态系统依赖关系的编排系统提供。为此,我们实现了Pishahang,这是一个共同管理和协调虚拟网络功能和基于云的微服务的框架。在演示过程中,我们部署了几个复杂的服务来演示Pishahang提供的支持复杂服务管理和编排的特性。
{"title":"Pishahang: Joint Orchestration of Network Function Chains and Distributed Cloud Applications","authors":"Hadi Razzaghi Kouchaksaraei, Tobias Dierich, H. Karl","doi":"10.1109/NETSOFT.2018.8460134","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8460134","url":null,"abstract":"Developing cloud applications using a microservice architecture allows their functional blocks to be distributed and deployed on multiple Cloud infrastructures. This enables service providers to mix and match Cloud-based microservices and Virtual Network Functions (VNFs) that are provided by Network Function Virtualization (NFV). Provisioning complex services containing VNFs and Cloud-based microservices across NFV and cloud infrastructures can enhance service quality, reduce latency, and optimise cost. This can be provided by an orchestration system that can handle cross-ecosystem dependencies. To this end, we implemented Pishahang that is a framework for jointly managing and orchestrating virtual network functions and Cloud-based microservices. During the demo, we deploy several complex services to demonstrate features provided by Pishahang to support management and orchestration of complex services.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114878420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Towards 5G Network Slicing for the V2X Ecosystem 面向V2X生态系统的5G网络切片
Pub Date : 2018-06-01 DOI: 10.1109/NETSOFT.2018.8459911
C. Campolo, A. Molinaro, A. Iera, R. Fontes, Christian Esteve Rothenberg
The automotive vertical market is currently undergoing key technological transformations as the number of connected and more autonomous vehicles grows, thus realizing the Vehicle-to-Everything (V2X) communication ecosystem. Such a revolution raises unprecedented challenges to the ICT players that have to guarantee ultra-low latency and ultra-high reliable connectivity under high-mobility and high-density conditions. By allowing an operator to flexibly provide dedicated logical networks with customer-specific (virtualized) functionalities over a common physical infrastructure, network slicing candidates itself as a prominent solution to support V2X over upcoming programmable and softwarized 5G systems. In this paper, we share our vision about V2X network slicing, by pinpointing key requirements and providing a set of design guidelines, aligned with ongoing 3GPP standard specifications and network softwarization directions.
随着互联汽车和自动驾驶汽车数量的增长,汽车垂直市场目前正在经历关键的技术变革,从而实现了车联网(V2X)通信生态系统。在高移动性和高密度条件下,必须保证超低延迟和超高可靠连接的ICT企业面临着前所未有的挑战。通过允许运营商在共同的物理基础设施上灵活地提供具有客户特定(虚拟化)功能的专用逻辑网络,网络切片本身就可以成为在即将到来的可编程和软件化5G系统上支持V2X的重要解决方案。在本文中,我们通过确定关键需求并提供一套设计指南,与正在进行的3GPP标准规范和网络软件化方向保持一致,分享了我们对V2X网络切片的看法。
{"title":"Towards 5G Network Slicing for the V2X Ecosystem","authors":"C. Campolo, A. Molinaro, A. Iera, R. Fontes, Christian Esteve Rothenberg","doi":"10.1109/NETSOFT.2018.8459911","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8459911","url":null,"abstract":"The automotive vertical market is currently undergoing key technological transformations as the number of connected and more autonomous vehicles grows, thus realizing the Vehicle-to-Everything (V2X) communication ecosystem. Such a revolution raises unprecedented challenges to the ICT players that have to guarantee ultra-low latency and ultra-high reliable connectivity under high-mobility and high-density conditions. By allowing an operator to flexibly provide dedicated logical networks with customer-specific (virtualized) functionalities over a common physical infrastructure, network slicing candidates itself as a prominent solution to support V2X over upcoming programmable and softwarized 5G systems. In this paper, we share our vision about V2X network slicing, by pinpointing key requirements and providing a set of design guidelines, aligned with ongoing 3GPP standard specifications and network softwarization directions.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115690590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Dynamic Security Orchestration for CDN Edge-Servers CDN边缘服务器的动态安全编排
Pub Date : 2018-06-01 DOI: 10.1109/NETSOFT.2018.8459970
Elaheh Jalalpour, Milad Ghaznavi, D. Migault, Stere Preda, M. Pourzandi, R. Boutaba
Content Delivery Networks (CDNs) aim to provide high Quality of Service (QoS) in serving digital content. To achieve high QoS, CDNs employ edge-servers that cache content in the vicinity of end-users. Edge-servers are vulnerable to attacks that degrade the QoS of end-users. Protecting edge-servers against these threats is vital and complex. The attack mitigation must be immediate, and its overhead should have the least impact on the QoS of legitimate end-users. In this paper, we demonstrate a software-based security system that can be programmed to automatically react to threats by deploying and managing security function chains. Using high-level security policies, a network operator can program a desired system behavior. We demonstrate how our system automatically deploys security function chains to handle real-world threats.
内容分发网络(cdn)旨在为数字内容提供高质量的服务(QoS)。为了实现高QoS, cdn使用边缘服务器将内容缓存在最终用户附近。边缘服务器容易受到攻击,从而降低终端用户的服务质量。保护边缘服务器免受这些威胁是至关重要且复杂的。攻击缓解必须是即时的,其开销应该对合法最终用户的QoS影响最小。在本文中,我们展示了一个基于软件的安全系统,该系统可以通过部署和管理安全功能链来自动响应威胁。使用高级安全策略,网络操作员可以编程所需的系统行为。我们将演示我们的系统如何自动部署安全功能链来处理现实世界的威胁。
{"title":"Dynamic Security Orchestration for CDN Edge-Servers","authors":"Elaheh Jalalpour, Milad Ghaznavi, D. Migault, Stere Preda, M. Pourzandi, R. Boutaba","doi":"10.1109/NETSOFT.2018.8459970","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8459970","url":null,"abstract":"Content Delivery Networks (CDNs) aim to provide high Quality of Service (QoS) in serving digital content. To achieve high QoS, CDNs employ edge-servers that cache content in the vicinity of end-users. Edge-servers are vulnerable to attacks that degrade the QoS of end-users. Protecting edge-servers against these threats is vital and complex. The attack mitigation must be immediate, and its overhead should have the least impact on the QoS of legitimate end-users. In this paper, we demonstrate a software-based security system that can be programmed to automatically react to threats by deploying and managing security function chains. Using high-level security policies, a network operator can program a desired system behavior. We demonstrate how our system automatically deploys security function chains to handle real-world threats.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121791036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Security Orchestration System for CDN Edge Servers CDN边缘服务器的安全编排系统
Pub Date : 2018-06-01 DOI: 10.1109/NETSOFT.2018.8459910
Elaheh Jalalpour, Milad Ghaznavi, D. Migault, Stere Preda, M. Pourzandi, R. Boutaba
A Content Delivery Network (CDN) employs edge-servers caching content close to end-users to provide high Quality of Service (QoS) in serving digital content. Attacks against edge-servers are known to cause QoS degradation and disruption in serving end-users. Protecting edge-servers is vital but represents a complex task. Not only must the attack mitigation be immediately effective, but the corresponding overhead should also not negatively affect the QoS of legitimate users. We propose a software-based security system for CDN edge-servers to mitigate various attacks. The approach is to automatically react to threats by deploying and managing security services. These security services are realized using virtualized security function chains created, configured, and removed dynamically. The desired system behavior is governed by high-level security policies dictated by a network operator. We demonstrate how our system can be programmed using these policies to automatically handle real-world attacks. Our performance evaluation shows that our system is low-overhead, immediately responds to threats, and quickly recovers legitimate traffic throughput.
内容分发网络(CDN)利用边缘服务器缓存靠近最终用户的内容,为数字内容提供高质量的服务。众所周知,对边缘服务器的攻击会导致服务质量的降低和终端用户服务的中断。保护边缘服务器至关重要,但也是一项复杂的任务。不仅攻击缓解必须立即有效,而且相应的开销也不应该对合法用户的QoS产生负面影响。本文提出了一种基于软件的CDN边缘服务器安全系统,以缓解各种攻击。该方法是通过部署和管理安全服务来自动对威胁作出反应。这些安全服务是通过动态创建、配置和删除虚拟安全功能链来实现的。所需的系统行为由网络运营商指定的高级安全策略控制。我们将演示如何使用这些策略对系统进行编程,以自动处理真实世界的攻击。我们的性能评估表明,我们的系统开销低,可以立即响应威胁,并快速恢复正常的流量吞吐量。
{"title":"A Security Orchestration System for CDN Edge Servers","authors":"Elaheh Jalalpour, Milad Ghaznavi, D. Migault, Stere Preda, M. Pourzandi, R. Boutaba","doi":"10.1109/NETSOFT.2018.8459910","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8459910","url":null,"abstract":"A Content Delivery Network (CDN) employs edge-servers caching content close to end-users to provide high Quality of Service (QoS) in serving digital content. Attacks against edge-servers are known to cause QoS degradation and disruption in serving end-users. Protecting edge-servers is vital but represents a complex task. Not only must the attack mitigation be immediately effective, but the corresponding overhead should also not negatively affect the QoS of legitimate users. We propose a software-based security system for CDN edge-servers to mitigate various attacks. The approach is to automatically react to threats by deploying and managing security services. These security services are realized using virtualized security function chains created, configured, and removed dynamically. The desired system behavior is governed by high-level security policies dictated by a network operator. We demonstrate how our system can be programmed using these policies to automatically handle real-world attacks. Our performance evaluation shows that our system is low-overhead, immediately responds to threats, and quickly recovers legitimate traffic throughput.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124028315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
NECOS Project: Towards Lightweight Slicing of Cloud Federated Infrastructures NECOS项目:面向云联邦基础设施的轻量级切片
Pub Date : 2018-06-01 DOI: 10.1109/NETSOFT.2018.8460008
Felipe S. Dantas Silva, Marcilio O. O. Lemos, Alisson Medeiros, A. Neto, R. Pasquini, D. Moura, Christian Esteve Rothenberg, L. Mamatas, S. Correa, K. Cardoso, C. Marcondes, A. Abelém, M. Nascimento, A. Galis, L. Contreras, J. Serrat, Panagiotis Papadimitriou
The Novel Enablers for Cloud Slicing (NECOS) project addresses the limitations of current cloud computing infrastructures to respond to the demand for new services, as presented in two use-cases, that will drive the whole execution of the project. The first use-case is focused on Telco service provider and is oriented towards the adoption of cloud computing in their large networks. The second use-case is targeting the use of edge clouds to support devices with low computation and storage capacity. The envisaged solution is based on a new concept, the Lightweight Slice Defined Cloud (LSDC), as an approach that extends the virtualization to all the resources in the involved networks and data centers and provides uniform management with a high-level of orchestration. In this position paper, we discuss the motivation, objectives, architecture, research challenges (and how to overcome them) and initial efforts for the NECOS project.
云切片的新推动者(NECOS)项目解决了当前云计算基础设施在响应新服务需求方面的局限性,如两个用例所示,这将推动整个项目的执行。第一个用例集中在电信服务提供商,面向在其大型网络中采用云计算。第二个用例的目标是使用边缘云来支持计算和存储容量较低的设备。设想的解决方案基于一个新概念,轻量级切片定义云(LSDC),作为一种将虚拟化扩展到所涉及的网络和数据中心中的所有资源的方法,并通过高级编排提供统一的管理。在本文中,我们将讨论NECOS项目的动机、目标、架构、研究挑战(以及如何克服它们)和最初的努力。
{"title":"NECOS Project: Towards Lightweight Slicing of Cloud Federated Infrastructures","authors":"Felipe S. Dantas Silva, Marcilio O. O. Lemos, Alisson Medeiros, A. Neto, R. Pasquini, D. Moura, Christian Esteve Rothenberg, L. Mamatas, S. Correa, K. Cardoso, C. Marcondes, A. Abelém, M. Nascimento, A. Galis, L. Contreras, J. Serrat, Panagiotis Papadimitriou","doi":"10.1109/NETSOFT.2018.8460008","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8460008","url":null,"abstract":"The Novel Enablers for Cloud Slicing (NECOS) project addresses the limitations of current cloud computing infrastructures to respond to the demand for new services, as presented in two use-cases, that will drive the whole execution of the project. The first use-case is focused on Telco service provider and is oriented towards the adoption of cloud computing in their large networks. The second use-case is targeting the use of edge clouds to support devices with low computation and storage capacity. The envisaged solution is based on a new concept, the Lightweight Slice Defined Cloud (LSDC), as an approach that extends the virtualization to all the resources in the involved networks and data centers and provides uniform management with a high-level of orchestration. In this position paper, we discuss the motivation, objectives, architecture, research challenges (and how to overcome them) and initial efforts for the NECOS project.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"240 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123880757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Balancing Delay and Cost in Virtual Network Function Placement and Chaining 虚拟网络功能布局与链接中时延与成本的平衡
Pub Date : 2018-06-01 DOI: 10.1109/NETSOFT.2018.8459956
Aris Leivadeas, M. Falkner, I. Lambadaris, M. Ibnkahla, G. Kesidis
Network Function Virtualization (NFV) has proliferated the way network services are offered to the end users. Individual network functions are decoupled from expensive and dedicated middleboxes and are now provided as software-based virtualized entities called Virtualized Network Functions (VNFs). The multiple advantages that NFV introduces and the reduction of operational and capital expenses that are promised have greatly attracted the Enterprise and Service Providers to reap the benefits of adopting NFV in their product portfolio. However, one of the most important challenges is the efficient placement of multiple chained VNFs in a cloud-based managed service scenario. To this end, in this paper we propose a novel approach to facilitate the placement and deployment of chained VNFs in a network cloud infrastructure that can be extended using the Multi-Access Edge Computing (MEC) standard for accommodating mission critical and delay sensitive traffic. Our aim is to minimize the end-to-end communication delay while keeping the overall deployment cost to minimum. Results reveal that the proposed approach can significantly reduce the delay experienced, while satisfying Service Providers' goal of low deployment costs.
网络功能虚拟化(NFV)已经扩展了向最终用户提供网络服务的方式。单独的网络功能从昂贵的专用中间件中分离出来,现在作为基于软件的虚拟化实体提供,称为虚拟化网络功能(VNFs)。NFV带来的多重优势以及承诺的运营和资本支出的减少,极大地吸引了企业和服务提供商在其产品组合中采用NFV来获得收益。然而,最重要的挑战之一是在基于云的托管服务场景中有效地放置多个链接VNFs。为此,在本文中,我们提出了一种新的方法来促进在网络云基础设施中放置和部署链式VNFs,该基础设施可以使用多访问边缘计算(MEC)标准进行扩展,以适应关键任务和延迟敏感流量。我们的目标是最小化端到端通信延迟,同时将总体部署成本保持在最低水平。结果表明,该方法在满足服务提供商低部署成本目标的同时,显著降低了延迟体验。
{"title":"Balancing Delay and Cost in Virtual Network Function Placement and Chaining","authors":"Aris Leivadeas, M. Falkner, I. Lambadaris, M. Ibnkahla, G. Kesidis","doi":"10.1109/NETSOFT.2018.8459956","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8459956","url":null,"abstract":"Network Function Virtualization (NFV) has proliferated the way network services are offered to the end users. Individual network functions are decoupled from expensive and dedicated middleboxes and are now provided as software-based virtualized entities called Virtualized Network Functions (VNFs). The multiple advantages that NFV introduces and the reduction of operational and capital expenses that are promised have greatly attracted the Enterprise and Service Providers to reap the benefits of adopting NFV in their product portfolio. However, one of the most important challenges is the efficient placement of multiple chained VNFs in a cloud-based managed service scenario. To this end, in this paper we propose a novel approach to facilitate the placement and deployment of chained VNFs in a network cloud infrastructure that can be extended using the Multi-Access Edge Computing (MEC) standard for accommodating mission critical and delay sensitive traffic. Our aim is to minimize the end-to-end communication delay while keeping the overall deployment cost to minimum. Results reveal that the proposed approach can significantly reduce the delay experienced, while satisfying Service Providers' goal of low deployment costs.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129015251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Anomaly Detection using Resource Behaviour Analysis for Autoscaling systems 基于资源行为分析的自动缩放系统异常检测
Pub Date : 2018-06-01 DOI: 10.1109/NETSOFT.2018.8460025
Rajsimman Ravichandiran, H. Bannazadeh, A. Leon-Garcia
In a cloud environment, autoscaling systems alleviate applications when additional resources are required. However, an illegitimate or malicious workload may force the system to automatically provision resources when they are not needed, thus leading to two key problems: economic denial of sustainability (eDoS) and wastage of resources. In this paper, we propose an anomaly detection mechanism using resource behaviour analysis to prevent these issues. We build univariate autoregressive statistical models to analyze resource behaviours for each microservice on the platform. The use of multiple models helps us discern unusual anomalies rather than a sudden increase in certain properties. We implemented the anomaly detection for the Elascale autoscaling engine on SAVI Testbed and evaluated the detection mechanisms against different attacks. From the results, we conclude that the models can accurately detect anomalous behaviour for applications (with cyclical trends) on the autoscaling platform.
在云环境中,当需要额外的资源时,自动伸缩系统可以减轻应用程序的负担。然而,非法或恶意的工作负载可能会迫使系统在不需要资源时自动提供资源,从而导致两个关键问题:经济拒绝可持续性(eDoS)和资源浪费。在本文中,我们提出了一种使用资源行为分析的异常检测机制来防止这些问题。我们建立了单变量自回归统计模型来分析平台上每个微服务的资源行为。多种模型的使用帮助我们识别不寻常的异常,而不是某些属性的突然增加。我们在SAVI测试平台上实现了针对Elascale自动伸缩引擎的异常检测,并评估了针对不同攻击的检测机制。从结果中,我们得出结论,该模型可以准确地检测自动缩放平台上应用程序(具有周期性趋势)的异常行为。
{"title":"Anomaly Detection using Resource Behaviour Analysis for Autoscaling systems","authors":"Rajsimman Ravichandiran, H. Bannazadeh, A. Leon-Garcia","doi":"10.1109/NETSOFT.2018.8460025","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8460025","url":null,"abstract":"In a cloud environment, autoscaling systems alleviate applications when additional resources are required. However, an illegitimate or malicious workload may force the system to automatically provision resources when they are not needed, thus leading to two key problems: economic denial of sustainability (eDoS) and wastage of resources. In this paper, we propose an anomaly detection mechanism using resource behaviour analysis to prevent these issues. We build univariate autoregressive statistical models to analyze resource behaviours for each microservice on the platform. The use of multiple models helps us discern unusual anomalies rather than a sudden increase in certain properties. We implemented the anomaly detection for the Elascale autoscaling engine on SAVI Testbed and evaluated the detection mechanisms against different attacks. From the results, we conclude that the models can accurately detect anomalous behaviour for applications (with cyclical trends) on the autoscaling platform.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130891975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Domain Federation via MPLS and SDN for Dynamic, Real-time End-to-end QoS Support 通过MPLS和SDN进行域联合,实现动态、实时的端到端QoS支持
Pub Date : 2018-06-01 DOI: 10.1109/NETSOFT.2018.8460119
Sidhant Hasija, Rashid Mijumbi, S. Davy, A. Davy, B. Jennings, K. Griffin
We explore Domain federation using SDN as a means of provisioning in real-time, end-to-end QoS. This can be achieved by having a holistic SDN control plane that takes care of dynamically provisioning application QoS needs per domain, and a federation of the domain controllers so as to enable secure and manageable grounds for deploying an RSVP-like service-request protocol between domains. Such a federation should be straightforward to create and be able to preserve the privacy of each domain. In this paper, we design, implement and evaluate an End-to-end MPLS-as-a-Service (EMPLaaS) framework. EMPLaaS is an evolution of MPLS in which SDN is used to provide a dynamic control plane so as to have an application-centric QoS framework. The end result is a scalable and privacy-aware multi-domain control plane for dynamically setting up resource reserved label-switched tunnels. The framework proposes payloading the MPLS service requests onto the widely deployed BGP so as to ensure inter-operability. It also derives responsive end-to-end network behavior by enabling application-delegated traffic engineering. Through an implementation, the proposed framework has been evaluated in terms of ability to setup QoS-aware paths dynamically and adaptively.
我们探索使用SDN作为实时端到端QoS配置手段的域联合。这可以通过拥有一个整体的SDN控制平面来实现,该控制平面负责动态地提供每个域的应用程序QoS需求,以及一个域控制器的联合,从而为在域之间部署类似rsvp的服务请求协议提供安全和可管理的基础。这样的联合应该很容易创建,并且能够保护每个域的隐私。在本文中,我们设计、实现和评估了一个端到端MPLS-as-a-Service (EMPLaaS)框架。EMPLaaS是MPLS的一种演进,其中使用SDN提供动态控制平面,从而具有以应用为中心的QoS框架。最终的结果是一个可扩展和隐私感知的多域控制平面,用于动态设置资源保留标签交换隧道。该框架提出将MPLS业务请求负载到广泛部署的BGP上,以保证互操作性。它还通过启用应用程序委托的流量工程派生出响应性的端到端网络行为。通过一个实现,根据动态和自适应地设置qos感知路径的能力对所提出的框架进行了评估。
{"title":"Domain Federation via MPLS and SDN for Dynamic, Real-time End-to-end QoS Support","authors":"Sidhant Hasija, Rashid Mijumbi, S. Davy, A. Davy, B. Jennings, K. Griffin","doi":"10.1109/NETSOFT.2018.8460119","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8460119","url":null,"abstract":"We explore Domain federation using SDN as a means of provisioning in real-time, end-to-end QoS. This can be achieved by having a holistic SDN control plane that takes care of dynamically provisioning application QoS needs per domain, and a federation of the domain controllers so as to enable secure and manageable grounds for deploying an RSVP-like service-request protocol between domains. Such a federation should be straightforward to create and be able to preserve the privacy of each domain. In this paper, we design, implement and evaluate an End-to-end MPLS-as-a-Service (EMPLaaS) framework. EMPLaaS is an evolution of MPLS in which SDN is used to provide a dynamic control plane so as to have an application-centric QoS framework. The end result is a scalable and privacy-aware multi-domain control plane for dynamically setting up resource reserved label-switched tunnels. The framework proposes payloading the MPLS service requests onto the widely deployed BGP so as to ensure inter-operability. It also derives responsive end-to-end network behavior by enabling application-delegated traffic engineering. Through an implementation, the proposed framework has been evaluated in terms of ability to setup QoS-aware paths dynamically and adaptively.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130405067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1