Pub Date : 2018-06-01DOI: 10.1109/NETSOFT.2018.8460027
Fayaz Akhtar, M. H. Rehmani, A. Davy
In-band southbound connectivity provides a cost-efficient way to share control traffic between the software-defined network controller and underlying forwarding devices; without having to worry about establishing and maintaining a separate transport network. However, the adoption of such a design also exposes the control plane traffic to non-negligible delay and losses; incurred from burdening a single transport network with an increased number of transmissions. These drawbacks can severely degrade network performance. For instance, when the requests in the form of control packets from switch-to-controller (or vice-versa) are dropped, the information may not get updated promptly and thus, the system would not behave as desired or in the worst case scenario can collapse altogether. To mitigate these constraints, in this paper, we propose the use of network coding which encourages information mixing as packets traverse the network. We show that network coding when applied to control plane traffic in an in-band design can help overcome losses due to congestion and link impairments. Evaluation results suggest that network coding aware in-band design can mitigate number of transmissions as well as total delay incurred by control packet losses.
{"title":"A Network Coding Approach to In-Band Control Traffic Sharing in Software Defined Networks","authors":"Fayaz Akhtar, M. H. Rehmani, A. Davy","doi":"10.1109/NETSOFT.2018.8460027","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8460027","url":null,"abstract":"In-band southbound connectivity provides a cost-efficient way to share control traffic between the software-defined network controller and underlying forwarding devices; without having to worry about establishing and maintaining a separate transport network. However, the adoption of such a design also exposes the control plane traffic to non-negligible delay and losses; incurred from burdening a single transport network with an increased number of transmissions. These drawbacks can severely degrade network performance. For instance, when the requests in the form of control packets from switch-to-controller (or vice-versa) are dropped, the information may not get updated promptly and thus, the system would not behave as desired or in the worst case scenario can collapse altogether. To mitigate these constraints, in this paper, we propose the use of network coding which encourages information mixing as packets traverse the network. We show that network coding when applied to control plane traffic in an in-band design can help overcome losses due to congestion and link impairments. Evaluation results suggest that network coding aware in-band design can mitigate number of transmissions as well as total delay incurred by control packet losses.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125036553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-01DOI: 10.1109/NETSOFT.2018.8459972
El-Fadel Bonfoh, Samir Medjiah, C. Chassot
Resource monitoring is a key task in network management. The concept of Software Defined Networking (SDN) allows taking benefits of the advantages of both active and passive monitoring techniques. However, this monitoring has a cost, hence the importance of the selection of the “key” switches to be interrogated and their polling frequency in order to reduce monitoring cost. This cost is expressed here in term of computing time. Monitoring of links can be used to determine the available bandwidth on each link, with the aim to meet the applicative QoS requirements based on appropriate routing. In this context, this paper first provides a formulation of the problem of choosing key switches as a vertex cover problem and proposes a heuristic method to solve the formulated problem. It then provides an implementation and a performance evaluation of the proposed algorithm within the Floodlight SDN controller. These performances are compared to those of the currently existing Floodlight monitoring module. Finally, we present one application of our proposed monitoring.
{"title":"A Parsimonious Monitoring Approach for Link Bandwidth Estimation within SDN-based Networks","authors":"El-Fadel Bonfoh, Samir Medjiah, C. Chassot","doi":"10.1109/NETSOFT.2018.8459972","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8459972","url":null,"abstract":"Resource monitoring is a key task in network management. The concept of Software Defined Networking (SDN) allows taking benefits of the advantages of both active and passive monitoring techniques. However, this monitoring has a cost, hence the importance of the selection of the “key” switches to be interrogated and their polling frequency in order to reduce monitoring cost. This cost is expressed here in term of computing time. Monitoring of links can be used to determine the available bandwidth on each link, with the aim to meet the applicative QoS requirements based on appropriate routing. In this context, this paper first provides a formulation of the problem of choosing key switches as a vertex cover problem and proposes a heuristic method to solve the formulated problem. It then provides an implementation and a performance evaluation of the proposed algorithm within the Floodlight SDN controller. These performances are compared to those of the currently existing Floodlight monitoring module. Finally, we present one application of our proposed monitoring.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131849470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-01DOI: 10.1109/NETSOFT.2018.8460134
Hadi Razzaghi Kouchaksaraei, Tobias Dierich, H. Karl
Developing cloud applications using a microservice architecture allows their functional blocks to be distributed and deployed on multiple Cloud infrastructures. This enables service providers to mix and match Cloud-based microservices and Virtual Network Functions (VNFs) that are provided by Network Function Virtualization (NFV). Provisioning complex services containing VNFs and Cloud-based microservices across NFV and cloud infrastructures can enhance service quality, reduce latency, and optimise cost. This can be provided by an orchestration system that can handle cross-ecosystem dependencies. To this end, we implemented Pishahang that is a framework for jointly managing and orchestrating virtual network functions and Cloud-based microservices. During the demo, we deploy several complex services to demonstrate features provided by Pishahang to support management and orchestration of complex services.
{"title":"Pishahang: Joint Orchestration of Network Function Chains and Distributed Cloud Applications","authors":"Hadi Razzaghi Kouchaksaraei, Tobias Dierich, H. Karl","doi":"10.1109/NETSOFT.2018.8460134","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8460134","url":null,"abstract":"Developing cloud applications using a microservice architecture allows their functional blocks to be distributed and deployed on multiple Cloud infrastructures. This enables service providers to mix and match Cloud-based microservices and Virtual Network Functions (VNFs) that are provided by Network Function Virtualization (NFV). Provisioning complex services containing VNFs and Cloud-based microservices across NFV and cloud infrastructures can enhance service quality, reduce latency, and optimise cost. This can be provided by an orchestration system that can handle cross-ecosystem dependencies. To this end, we implemented Pishahang that is a framework for jointly managing and orchestrating virtual network functions and Cloud-based microservices. During the demo, we deploy several complex services to demonstrate features provided by Pishahang to support management and orchestration of complex services.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114878420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-01DOI: 10.1109/NETSOFT.2018.8459911
C. Campolo, A. Molinaro, A. Iera, R. Fontes, Christian Esteve Rothenberg
The automotive vertical market is currently undergoing key technological transformations as the number of connected and more autonomous vehicles grows, thus realizing the Vehicle-to-Everything (V2X) communication ecosystem. Such a revolution raises unprecedented challenges to the ICT players that have to guarantee ultra-low latency and ultra-high reliable connectivity under high-mobility and high-density conditions. By allowing an operator to flexibly provide dedicated logical networks with customer-specific (virtualized) functionalities over a common physical infrastructure, network slicing candidates itself as a prominent solution to support V2X over upcoming programmable and softwarized 5G systems. In this paper, we share our vision about V2X network slicing, by pinpointing key requirements and providing a set of design guidelines, aligned with ongoing 3GPP standard specifications and network softwarization directions.
{"title":"Towards 5G Network Slicing for the V2X Ecosystem","authors":"C. Campolo, A. Molinaro, A. Iera, R. Fontes, Christian Esteve Rothenberg","doi":"10.1109/NETSOFT.2018.8459911","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8459911","url":null,"abstract":"The automotive vertical market is currently undergoing key technological transformations as the number of connected and more autonomous vehicles grows, thus realizing the Vehicle-to-Everything (V2X) communication ecosystem. Such a revolution raises unprecedented challenges to the ICT players that have to guarantee ultra-low latency and ultra-high reliable connectivity under high-mobility and high-density conditions. By allowing an operator to flexibly provide dedicated logical networks with customer-specific (virtualized) functionalities over a common physical infrastructure, network slicing candidates itself as a prominent solution to support V2X over upcoming programmable and softwarized 5G systems. In this paper, we share our vision about V2X network slicing, by pinpointing key requirements and providing a set of design guidelines, aligned with ongoing 3GPP standard specifications and network softwarization directions.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115690590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-01DOI: 10.1109/NETSOFT.2018.8459970
Elaheh Jalalpour, Milad Ghaznavi, D. Migault, Stere Preda, M. Pourzandi, R. Boutaba
Content Delivery Networks (CDNs) aim to provide high Quality of Service (QoS) in serving digital content. To achieve high QoS, CDNs employ edge-servers that cache content in the vicinity of end-users. Edge-servers are vulnerable to attacks that degrade the QoS of end-users. Protecting edge-servers against these threats is vital and complex. The attack mitigation must be immediate, and its overhead should have the least impact on the QoS of legitimate end-users. In this paper, we demonstrate a software-based security system that can be programmed to automatically react to threats by deploying and managing security function chains. Using high-level security policies, a network operator can program a desired system behavior. We demonstrate how our system automatically deploys security function chains to handle real-world threats.
{"title":"Dynamic Security Orchestration for CDN Edge-Servers","authors":"Elaheh Jalalpour, Milad Ghaznavi, D. Migault, Stere Preda, M. Pourzandi, R. Boutaba","doi":"10.1109/NETSOFT.2018.8459970","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8459970","url":null,"abstract":"Content Delivery Networks (CDNs) aim to provide high Quality of Service (QoS) in serving digital content. To achieve high QoS, CDNs employ edge-servers that cache content in the vicinity of end-users. Edge-servers are vulnerable to attacks that degrade the QoS of end-users. Protecting edge-servers against these threats is vital and complex. The attack mitigation must be immediate, and its overhead should have the least impact on the QoS of legitimate end-users. In this paper, we demonstrate a software-based security system that can be programmed to automatically react to threats by deploying and managing security function chains. Using high-level security policies, a network operator can program a desired system behavior. We demonstrate how our system automatically deploys security function chains to handle real-world threats.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121791036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-01DOI: 10.1109/NETSOFT.2018.8459910
Elaheh Jalalpour, Milad Ghaznavi, D. Migault, Stere Preda, M. Pourzandi, R. Boutaba
A Content Delivery Network (CDN) employs edge-servers caching content close to end-users to provide high Quality of Service (QoS) in serving digital content. Attacks against edge-servers are known to cause QoS degradation and disruption in serving end-users. Protecting edge-servers is vital but represents a complex task. Not only must the attack mitigation be immediately effective, but the corresponding overhead should also not negatively affect the QoS of legitimate users. We propose a software-based security system for CDN edge-servers to mitigate various attacks. The approach is to automatically react to threats by deploying and managing security services. These security services are realized using virtualized security function chains created, configured, and removed dynamically. The desired system behavior is governed by high-level security policies dictated by a network operator. We demonstrate how our system can be programmed using these policies to automatically handle real-world attacks. Our performance evaluation shows that our system is low-overhead, immediately responds to threats, and quickly recovers legitimate traffic throughput.
{"title":"A Security Orchestration System for CDN Edge Servers","authors":"Elaheh Jalalpour, Milad Ghaznavi, D. Migault, Stere Preda, M. Pourzandi, R. Boutaba","doi":"10.1109/NETSOFT.2018.8459910","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8459910","url":null,"abstract":"A Content Delivery Network (CDN) employs edge-servers caching content close to end-users to provide high Quality of Service (QoS) in serving digital content. Attacks against edge-servers are known to cause QoS degradation and disruption in serving end-users. Protecting edge-servers is vital but represents a complex task. Not only must the attack mitigation be immediately effective, but the corresponding overhead should also not negatively affect the QoS of legitimate users. We propose a software-based security system for CDN edge-servers to mitigate various attacks. The approach is to automatically react to threats by deploying and managing security services. These security services are realized using virtualized security function chains created, configured, and removed dynamically. The desired system behavior is governed by high-level security policies dictated by a network operator. We demonstrate how our system can be programmed using these policies to automatically handle real-world attacks. Our performance evaluation shows that our system is low-overhead, immediately responds to threats, and quickly recovers legitimate traffic throughput.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124028315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-01DOI: 10.1109/NETSOFT.2018.8460008
Felipe S. Dantas Silva, Marcilio O. O. Lemos, Alisson Medeiros, A. Neto, R. Pasquini, D. Moura, Christian Esteve Rothenberg, L. Mamatas, S. Correa, K. Cardoso, C. Marcondes, A. Abelém, M. Nascimento, A. Galis, L. Contreras, J. Serrat, Panagiotis Papadimitriou
The Novel Enablers for Cloud Slicing (NECOS) project addresses the limitations of current cloud computing infrastructures to respond to the demand for new services, as presented in two use-cases, that will drive the whole execution of the project. The first use-case is focused on Telco service provider and is oriented towards the adoption of cloud computing in their large networks. The second use-case is targeting the use of edge clouds to support devices with low computation and storage capacity. The envisaged solution is based on a new concept, the Lightweight Slice Defined Cloud (LSDC), as an approach that extends the virtualization to all the resources in the involved networks and data centers and provides uniform management with a high-level of orchestration. In this position paper, we discuss the motivation, objectives, architecture, research challenges (and how to overcome them) and initial efforts for the NECOS project.
{"title":"NECOS Project: Towards Lightweight Slicing of Cloud Federated Infrastructures","authors":"Felipe S. Dantas Silva, Marcilio O. O. Lemos, Alisson Medeiros, A. Neto, R. Pasquini, D. Moura, Christian Esteve Rothenberg, L. Mamatas, S. Correa, K. Cardoso, C. Marcondes, A. Abelém, M. Nascimento, A. Galis, L. Contreras, J. Serrat, Panagiotis Papadimitriou","doi":"10.1109/NETSOFT.2018.8460008","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8460008","url":null,"abstract":"The Novel Enablers for Cloud Slicing (NECOS) project addresses the limitations of current cloud computing infrastructures to respond to the demand for new services, as presented in two use-cases, that will drive the whole execution of the project. The first use-case is focused on Telco service provider and is oriented towards the adoption of cloud computing in their large networks. The second use-case is targeting the use of edge clouds to support devices with low computation and storage capacity. The envisaged solution is based on a new concept, the Lightweight Slice Defined Cloud (LSDC), as an approach that extends the virtualization to all the resources in the involved networks and data centers and provides uniform management with a high-level of orchestration. In this position paper, we discuss the motivation, objectives, architecture, research challenges (and how to overcome them) and initial efforts for the NECOS project.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"240 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123880757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-01DOI: 10.1109/NETSOFT.2018.8459956
Aris Leivadeas, M. Falkner, I. Lambadaris, M. Ibnkahla, G. Kesidis
Network Function Virtualization (NFV) has proliferated the way network services are offered to the end users. Individual network functions are decoupled from expensive and dedicated middleboxes and are now provided as software-based virtualized entities called Virtualized Network Functions (VNFs). The multiple advantages that NFV introduces and the reduction of operational and capital expenses that are promised have greatly attracted the Enterprise and Service Providers to reap the benefits of adopting NFV in their product portfolio. However, one of the most important challenges is the efficient placement of multiple chained VNFs in a cloud-based managed service scenario. To this end, in this paper we propose a novel approach to facilitate the placement and deployment of chained VNFs in a network cloud infrastructure that can be extended using the Multi-Access Edge Computing (MEC) standard for accommodating mission critical and delay sensitive traffic. Our aim is to minimize the end-to-end communication delay while keeping the overall deployment cost to minimum. Results reveal that the proposed approach can significantly reduce the delay experienced, while satisfying Service Providers' goal of low deployment costs.
{"title":"Balancing Delay and Cost in Virtual Network Function Placement and Chaining","authors":"Aris Leivadeas, M. Falkner, I. Lambadaris, M. Ibnkahla, G. Kesidis","doi":"10.1109/NETSOFT.2018.8459956","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8459956","url":null,"abstract":"Network Function Virtualization (NFV) has proliferated the way network services are offered to the end users. Individual network functions are decoupled from expensive and dedicated middleboxes and are now provided as software-based virtualized entities called Virtualized Network Functions (VNFs). The multiple advantages that NFV introduces and the reduction of operational and capital expenses that are promised have greatly attracted the Enterprise and Service Providers to reap the benefits of adopting NFV in their product portfolio. However, one of the most important challenges is the efficient placement of multiple chained VNFs in a cloud-based managed service scenario. To this end, in this paper we propose a novel approach to facilitate the placement and deployment of chained VNFs in a network cloud infrastructure that can be extended using the Multi-Access Edge Computing (MEC) standard for accommodating mission critical and delay sensitive traffic. Our aim is to minimize the end-to-end communication delay while keeping the overall deployment cost to minimum. Results reveal that the proposed approach can significantly reduce the delay experienced, while satisfying Service Providers' goal of low deployment costs.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129015251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-01DOI: 10.1109/NETSOFT.2018.8460025
Rajsimman Ravichandiran, H. Bannazadeh, A. Leon-Garcia
In a cloud environment, autoscaling systems alleviate applications when additional resources are required. However, an illegitimate or malicious workload may force the system to automatically provision resources when they are not needed, thus leading to two key problems: economic denial of sustainability (eDoS) and wastage of resources. In this paper, we propose an anomaly detection mechanism using resource behaviour analysis to prevent these issues. We build univariate autoregressive statistical models to analyze resource behaviours for each microservice on the platform. The use of multiple models helps us discern unusual anomalies rather than a sudden increase in certain properties. We implemented the anomaly detection for the Elascale autoscaling engine on SAVI Testbed and evaluated the detection mechanisms against different attacks. From the results, we conclude that the models can accurately detect anomalous behaviour for applications (with cyclical trends) on the autoscaling platform.
{"title":"Anomaly Detection using Resource Behaviour Analysis for Autoscaling systems","authors":"Rajsimman Ravichandiran, H. Bannazadeh, A. Leon-Garcia","doi":"10.1109/NETSOFT.2018.8460025","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8460025","url":null,"abstract":"In a cloud environment, autoscaling systems alleviate applications when additional resources are required. However, an illegitimate or malicious workload may force the system to automatically provision resources when they are not needed, thus leading to two key problems: economic denial of sustainability (eDoS) and wastage of resources. In this paper, we propose an anomaly detection mechanism using resource behaviour analysis to prevent these issues. We build univariate autoregressive statistical models to analyze resource behaviours for each microservice on the platform. The use of multiple models helps us discern unusual anomalies rather than a sudden increase in certain properties. We implemented the anomaly detection for the Elascale autoscaling engine on SAVI Testbed and evaluated the detection mechanisms against different attacks. From the results, we conclude that the models can accurately detect anomalous behaviour for applications (with cyclical trends) on the autoscaling platform.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130891975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-01DOI: 10.1109/NETSOFT.2018.8460119
Sidhant Hasija, Rashid Mijumbi, S. Davy, A. Davy, B. Jennings, K. Griffin
We explore Domain federation using SDN as a means of provisioning in real-time, end-to-end QoS. This can be achieved by having a holistic SDN control plane that takes care of dynamically provisioning application QoS needs per domain, and a federation of the domain controllers so as to enable secure and manageable grounds for deploying an RSVP-like service-request protocol between domains. Such a federation should be straightforward to create and be able to preserve the privacy of each domain. In this paper, we design, implement and evaluate an End-to-end MPLS-as-a-Service (EMPLaaS) framework. EMPLaaS is an evolution of MPLS in which SDN is used to provide a dynamic control plane so as to have an application-centric QoS framework. The end result is a scalable and privacy-aware multi-domain control plane for dynamically setting up resource reserved label-switched tunnels. The framework proposes payloading the MPLS service requests onto the widely deployed BGP so as to ensure inter-operability. It also derives responsive end-to-end network behavior by enabling application-delegated traffic engineering. Through an implementation, the proposed framework has been evaluated in terms of ability to setup QoS-aware paths dynamically and adaptively.
{"title":"Domain Federation via MPLS and SDN for Dynamic, Real-time End-to-end QoS Support","authors":"Sidhant Hasija, Rashid Mijumbi, S. Davy, A. Davy, B. Jennings, K. Griffin","doi":"10.1109/NETSOFT.2018.8460119","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8460119","url":null,"abstract":"We explore Domain federation using SDN as a means of provisioning in real-time, end-to-end QoS. This can be achieved by having a holistic SDN control plane that takes care of dynamically provisioning application QoS needs per domain, and a federation of the domain controllers so as to enable secure and manageable grounds for deploying an RSVP-like service-request protocol between domains. Such a federation should be straightforward to create and be able to preserve the privacy of each domain. In this paper, we design, implement and evaluate an End-to-end MPLS-as-a-Service (EMPLaaS) framework. EMPLaaS is an evolution of MPLS in which SDN is used to provide a dynamic control plane so as to have an application-centric QoS framework. The end result is a scalable and privacy-aware multi-domain control plane for dynamically setting up resource reserved label-switched tunnels. The framework proposes payloading the MPLS service requests onto the widely deployed BGP so as to ensure inter-operability. It also derives responsive end-to-end network behavior by enabling application-delegated traffic engineering. Through an implementation, the proposed framework has been evaluated in terms of ability to setup QoS-aware paths dynamically and adaptively.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130405067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}