Pub Date : 2018-06-01DOI: 10.1109/NETSOFT.2018.8460102
Chunghan Lee, Katsuhito Asano, T. Ishihara
Today's cloud network consists of sophisticated virtual networks, and a virtual switch is a key element of these networks. Although there is tremendous interest in measuring cloud network performance, little is known about the impact of software-based virtual network on latency. In this paper, we conduct the impact of virtual network on latency in the public cloud based on OpenStack. We measured the throughput of VMs and simultaneously captured their packets on hosts. We analyzed the traces by using well-known metrics, such as throughput and RTT, and investigated the abrupt fluctuation of latency called as ‘the burstiness of latency’. We quantitatively clarify the impact of software-based virtual network on latency. In our public cloud, the latency is approximately 35.2% of RTT and 10% of burstiness mainly contributes to the increased RTT. The total latency was increased by the receiving side regardless of data and ACK paths. Our analysis results, discussions, and implications can not only help cloud researchers and developers design the next generation of software-based virtual network but can also help cloud operators improve the performance of virtual network.
{"title":"The Impact of Software-based Virtual Network in the Public Cloud","authors":"Chunghan Lee, Katsuhito Asano, T. Ishihara","doi":"10.1109/NETSOFT.2018.8460102","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8460102","url":null,"abstract":"Today's cloud network consists of sophisticated virtual networks, and a virtual switch is a key element of these networks. Although there is tremendous interest in measuring cloud network performance, little is known about the impact of software-based virtual network on latency. In this paper, we conduct the impact of virtual network on latency in the public cloud based on OpenStack. We measured the throughput of VMs and simultaneously captured their packets on hosts. We analyzed the traces by using well-known metrics, such as throughput and RTT, and investigated the abrupt fluctuation of latency called as ‘the burstiness of latency’. We quantitatively clarify the impact of software-based virtual network on latency. In our public cloud, the latency is approximately 35.2% of RTT and 10% of burstiness mainly contributes to the increased RTT. The total latency was increased by the receiving side regardless of data and ACK paths. Our analysis results, discussions, and implications can not only help cloud researchers and developers design the next generation of software-based virtual network but can also help cloud operators improve the performance of virtual network.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123892510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-01DOI: 10.1109/NETSOFT.2018.8460118
Amina Boubendir, F. Guillemin, C. Toquin, Marie-Line Alberi-Morel, Frédéric Faucheux, S. Kerboeuf, J. Lafragette, Barbara Orlandi
By stating that edge resource federation is crucial in future 5G ecosystems, we demonstrate an architecture, where a network operator can achieve the federation of access and edge resources owned by private third-party actors through B2B relationships. Through a Proof-of-Concept, we illustrate on-demand creation and deployment of network slices dynamically over multiple domains for live content services in a Stadium.
{"title":"5G Edge Resource Federation: Dynamic and Cross-domain Network Slice Deployment","authors":"Amina Boubendir, F. Guillemin, C. Toquin, Marie-Line Alberi-Morel, Frédéric Faucheux, S. Kerboeuf, J. Lafragette, Barbara Orlandi","doi":"10.1109/NETSOFT.2018.8460118","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8460118","url":null,"abstract":"By stating that edge resource federation is crucial in future 5G ecosystems, we demonstrate an architecture, where a network operator can achieve the federation of access and edge resources owned by private third-party actors through B2B relationships. Through a Proof-of-Concept, we illustrate on-demand creation and deployment of network slices dynamically over multiple domains for live content services in a Stadium.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127767474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-01DOI: 10.1109/NETSOFT.2018.8459913
K. Nishimoto, Y. Koyasako, Takashi Yamada, J. Kani, A. Otaka
For enhancing flexibility in optical access network services, virtualization and softwarization of optical access network equipment in a Central Office have become a hot topic in this couple of years. We try to implement the software module-based Optical Line Terminal (OLT) for further flexibility in updating its functions. However, performance degradation compared to a conventional hardware OLT, is a technical obstacle for softwarization and modularization. This article reports the influence of softwarization and modularization, and the improvement by our proposed methods, based on prototype evaluation.
{"title":"Software module-based 10G Optical Line Terminal for enhancing flexibility of access networks","authors":"K. Nishimoto, Y. Koyasako, Takashi Yamada, J. Kani, A. Otaka","doi":"10.1109/NETSOFT.2018.8459913","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8459913","url":null,"abstract":"For enhancing flexibility in optical access network services, virtualization and softwarization of optical access network equipment in a Central Office have become a hot topic in this couple of years. We try to implement the software module-based Optical Line Terminal (OLT) for further flexibility in updating its functions. However, performance degradation compared to a conventional hardware OLT, is a technical obstacle for softwarization and modularization. This article reports the influence of softwarization and modularization, and the improvement by our proposed methods, based on prototype evaluation.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117007365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-01DOI: 10.1109/NETSOFT.2018.8458493
Fabio D'Urso, Christian Grasso, C. Santoro, Federico Fausto Santoro, G. Schembra
This paper presents a software architecture, based on the Tactile Internet 5G network slice, to control a flock of UAVs performing a monitoring mission. In contrast to classical approaches for UAV flock control, which employ ad-hoc software running directly on board of of UAVs, we propose a solution in which flock and mission control tasks run at the edge of a 5G network; the architecture takes advantage of the Tactile Internet to implement a ultra-low latency communication link needed to send driving commands to UAVs. As a result, the deployment of computations in the edge provides many advantages, in terms of scalability and fault-tolerance, and avoids processing latencies, due to communication links, that represent an important drawback in traditional solutions.
{"title":"The Tactile Internet for the flight control of UAV flocks","authors":"Fabio D'Urso, Christian Grasso, C. Santoro, Federico Fausto Santoro, G. Schembra","doi":"10.1109/NETSOFT.2018.8458493","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8458493","url":null,"abstract":"This paper presents a software architecture, based on the Tactile Internet 5G network slice, to control a flock of UAVs performing a monitoring mission. In contrast to classical approaches for UAV flock control, which employ ad-hoc software running directly on board of of UAVs, we propose a solution in which flock and mission control tasks run at the edge of a 5G network; the architecture takes advantage of the Tactile Internet to implement a ultra-low latency communication link needed to send driving commands to UAVs. As a result, the deployment of computations in the edge provides many advantages, in terms of scalability and fault-tolerance, and avoids processing latencies, due to communication links, that represent an important drawback in traditional solutions.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117344933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-01DOI: 10.1109/NETSOFT.2018.8460125
Michael Baddeley, R. Nejabati, G. Oikonomou, M. Sooriyabandara, D. Simeonidou
Software Defined Networking (SDN) offers a flexible and scalable architecture that abstracts decision making away from individual devices and provides a programmable network platform. Low-power wireless Internet of Things (IoT) networks, where multi-tenant and multi-application architectures require scalable and configurable solutions, are ideally placed to capitalize on this research. However, implementing a centralized SDN architecture within the constraints of a low-power wireless network faces considerable challenges. Not only is controller traffic subject to jitter due to unreliable links and network contention, but the overhead generated by SDN can severely affect the performance of other traffic. This paper addresses the challenge of bringing high-overhead SDN architecture to IEEE 802.15.4 networks. We explore how the traditional view of SDN needs to evolve in order to overcome the constraints of low-power wireless networks, and discuss protocol and architectural optimizations necessary to reduce SDN control overhead - the main barrier to successful implementation. Additionally, we argue that interoperability with the existing protocol stack is necessary to provide a platform for controller discovery, and coexistence with legacy networks. We consequently introduce $mu text{SDN}$, a lightweight SDN framework for Contiki OS with both IPv6 and underlying routing protocol interoperability, as well as optimizing a number of elements within the SDN architecture to reduce control overhead to practical levels. We evaluate $mu text{SDN}$ in terms of latency, energy, and packet delivery. Through this evaluation we show how the cost of SDN control overhead (both bootstrapping and management) can be reduced to a point where comparable performance and scalability is achieved against an IEEE 802.15.4-2012 RPL-based network. Additionally, we demonstrate $mu text{SDN}$ through simulation: providing a use-case where the SDN configurability can be used to provide Quality of Service (QoS) for critical network flows experiencing interference, and we achieve considerable reductions in delay and jitter in comparison to a scenario without SDN.
{"title":"Evolving SDN for Low-Power IoT Networks","authors":"Michael Baddeley, R. Nejabati, G. Oikonomou, M. Sooriyabandara, D. Simeonidou","doi":"10.1109/NETSOFT.2018.8460125","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8460125","url":null,"abstract":"Software Defined Networking (SDN) offers a flexible and scalable architecture that abstracts decision making away from individual devices and provides a programmable network platform. Low-power wireless Internet of Things (IoT) networks, where multi-tenant and multi-application architectures require scalable and configurable solutions, are ideally placed to capitalize on this research. However, implementing a centralized SDN architecture within the constraints of a low-power wireless network faces considerable challenges. Not only is controller traffic subject to jitter due to unreliable links and network contention, but the overhead generated by SDN can severely affect the performance of other traffic. This paper addresses the challenge of bringing high-overhead SDN architecture to IEEE 802.15.4 networks. We explore how the traditional view of SDN needs to evolve in order to overcome the constraints of low-power wireless networks, and discuss protocol and architectural optimizations necessary to reduce SDN control overhead - the main barrier to successful implementation. Additionally, we argue that interoperability with the existing protocol stack is necessary to provide a platform for controller discovery, and coexistence with legacy networks. We consequently introduce $mu text{SDN}$, a lightweight SDN framework for Contiki OS with both IPv6 and underlying routing protocol interoperability, as well as optimizing a number of elements within the SDN architecture to reduce control overhead to practical levels. We evaluate $mu text{SDN}$ in terms of latency, energy, and packet delivery. Through this evaluation we show how the cost of SDN control overhead (both bootstrapping and management) can be reduced to a point where comparable performance and scalability is achieved against an IEEE 802.15.4-2012 RPL-based network. Additionally, we demonstrate $mu text{SDN}$ through simulation: providing a use-case where the SDN configurability can be used to provide Quality of Service (QoS) for critical network flows experiencing interference, and we achieve considerable reductions in delay and jitter in comparison to a scenario without SDN.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114411846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-01DOI: 10.1109/NETSOFT.2018.8460072
Sumitro Bhaumik, Sandip Chakraborty
Maintaining quality of service (QoS) at network cores is particularly challenging because of the dynamic service requirements from long (elephant) and short (mice) flows. Traditional integrated and differentiated services have high overhead in this scenario because they work on packet level classification rather than on flow level classification, and also it is difficult to estimate the QoS requirements a priori. In this paper, we explore a software controlled architecture to implement a hierarchical control and management framework for QoS provisioning at network cores. We show that both the service differentiation and fairness are required to maintain QoS in such scenario. Accordingly in this paper, we propose an optimization followed by a two dimensional queue management policy, called Hierarchical Two Dimension Queuing (H2DQ), over a software controlled differentiated service architecture to ensure both the service requirements and fairness for the elephant as well as mice flows. We have implemented H2DQ over a testbed using virtualized architecture, and show that H2DQ can significantly improve the performance in terms of QoS and fairness performance, while having less control overhead.
{"title":"Hierarchical Two Dimensional Queuing: A Scalable Approach for Traffic Shaping using Software Defined Networking","authors":"Sumitro Bhaumik, Sandip Chakraborty","doi":"10.1109/NETSOFT.2018.8460072","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8460072","url":null,"abstract":"Maintaining quality of service (QoS) at network cores is particularly challenging because of the dynamic service requirements from long (elephant) and short (mice) flows. Traditional integrated and differentiated services have high overhead in this scenario because they work on packet level classification rather than on flow level classification, and also it is difficult to estimate the QoS requirements a priori. In this paper, we explore a software controlled architecture to implement a hierarchical control and management framework for QoS provisioning at network cores. We show that both the service differentiation and fairness are required to maintain QoS in such scenario. Accordingly in this paper, we propose an optimization followed by a two dimensional queue management policy, called Hierarchical Two Dimension Queuing (H2DQ), over a software controlled differentiated service architecture to ensure both the service requirements and fairness for the elephant as well as mice flows. We have implemented H2DQ over a testbed using virtualized architecture, and show that H2DQ can significantly improve the performance in terms of QoS and fairness performance, while having less control overhead.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115207778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-01DOI: 10.1109/NETSOFT.2018.8459961
Quang-Vinh Dang, J. François
Several cybersecurity attack enumerations area available today. These enumerations present lists of known attack patterns (CAPEC), security weaknesses (CWE) or cybersecurity vulnerabilities (CVE). These enumerations are being developed separately and manually. In this paper, we present the efforts in determining the relations between enumerations automatically. We rely on text-based, graph-based and recommendation-based approaches. Then we present of using the prediction in recommending related attacks to SDN/NFV security issues. Experimental results showed that we can actually infer real relations. Furthermore, the results gave some insights into how the enumerations are created and linked, and some suggestions to improve the process in the future.
{"title":"Utilizing attack enumerations to study SDN/NFV vulnerabilities","authors":"Quang-Vinh Dang, J. François","doi":"10.1109/NETSOFT.2018.8459961","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8459961","url":null,"abstract":"Several cybersecurity attack enumerations area available today. These enumerations present lists of known attack patterns (CAPEC), security weaknesses (CWE) or cybersecurity vulnerabilities (CVE). These enumerations are being developed separately and manually. In this paper, we present the efforts in determining the relations between enumerations automatically. We rely on text-based, graph-based and recommendation-based approaches. Then we present of using the prediction in recommending related attacks to SDN/NFV security issues. Experimental results showed that we can actually infer real relations. Furthermore, the results gave some insights into how the enumerations are created and linked, and some suggestions to improve the process in the future.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125418739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-01DOI: 10.1109/NETSOFT.2018.8460121
Radoslaw Cwalinski, H. König
In this paper we propose an novel approach to secure enterprise Wireless Local Area Networks (WLANs) by leveraging the Software-defined Networking (SDN) paradigm to detect and mitigate attack attempts in WLANs. We extend our SDN platform from [1] to implement a client localization mechanism that exploits information from the physical and MAC layers offered by current wireless chipsets to localize transmitting clients. Based on location information, we create a “virtual perimeter” to prevent WLAN access for clients from outside of the defined area. We further introduce a single-channel WLAN model as a possible solution optimization. Our evaluation shows that the proposed solution succeeds in identifying WLAN Denial-of-Service attacks, such as IEEE 802.11 deauthentication.
{"title":"SDN-based Attack Detection in Wireless Local Area Networks","authors":"Radoslaw Cwalinski, H. König","doi":"10.1109/NETSOFT.2018.8460121","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8460121","url":null,"abstract":"In this paper we propose an novel approach to secure enterprise Wireless Local Area Networks (WLANs) by leveraging the Software-defined Networking (SDN) paradigm to detect and mitigate attack attempts in WLANs. We extend our SDN platform from [1] to implement a client localization mechanism that exploits information from the physical and MAC layers offered by current wireless chipsets to localize transmitting clients. Based on location information, we create a “virtual perimeter” to prevent WLAN access for clients from outside of the defined area. We further introduce a single-channel WLAN model as a possible solution optimization. Our evaluation shows that the proposed solution succeeds in identifying WLAN Denial-of-Service attacks, such as IEEE 802.11 deauthentication.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121988678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-01DOI: 10.1109/NETSOFT.2018.8459990
L. A. Freitas, Vinícius G. Braga, S. Correa, L. Mamatas, Christian Esteve Rothenberg, S. Clayman, K. Cardoso
In the context of 5G networks, the concept of network slicing allows network providers to flexibly share infrastructures with mobile service providers and verticals. While this concept has been widely investigated considering mostly the network issues, in this work we focus on a slice as a service model that takes into account the data center (DC) perspective. In particular, we propose an architecture where DC slices are created over transformable (compute and storage) resources, which can be virtualized or de-virtualized on-demand. Then, on top of each slice, an on-demand VIM is instantiated to control the allocated resources. As a realization of this architecture, we introduce the DC Slice Controller, a system able to deploy and delivery full operational VIMs based on generic templates. We evaluate the effectiveness of the proposed system deploying three VIMs (VLSP, Kubernetes, and OpenStack) over commodity hardware. Experimental results show that the DC Slice Controller can timely provide a slice even when dealing with sophisticated VIMs such as OpenStack. As an example, we were able to delivery a fully functional OpenStack in four nodes in less than 10 minutes.
{"title":"Slicing and Allocation of Transformable Resources for the Deployment of Multiple Virtualized Infrastructure Managers (VIMs)","authors":"L. A. Freitas, Vinícius G. Braga, S. Correa, L. Mamatas, Christian Esteve Rothenberg, S. Clayman, K. Cardoso","doi":"10.1109/NETSOFT.2018.8459990","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8459990","url":null,"abstract":"In the context of 5G networks, the concept of network slicing allows network providers to flexibly share infrastructures with mobile service providers and verticals. While this concept has been widely investigated considering mostly the network issues, in this work we focus on a slice as a service model that takes into account the data center (DC) perspective. In particular, we propose an architecture where DC slices are created over transformable (compute and storage) resources, which can be virtualized or de-virtualized on-demand. Then, on top of each slice, an on-demand VIM is instantiated to control the allocated resources. As a realization of this architecture, we introduce the DC Slice Controller, a system able to deploy and delivery full operational VIMs based on generic templates. We evaluate the effectiveness of the proposed system deploying three VIMs (VLSP, Kubernetes, and OpenStack) over commodity hardware. Experimental results show that the DC Slice Controller can timely provide a slice even when dealing with sophisticated VIMs such as OpenStack. As an example, we were able to delivery a fully functional OpenStack in four nodes in less than 10 minutes.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125960326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-01DOI: 10.1109/NETSOFT.2018.8459934
Aris Leivadeas, M. Falkner, I. Lambadaris, G. Kesidis, Chung-Horng Lung, M. Ibnkahla
Network Functions Virtualization (NFV) along with the Service Chaining paradigm have changed the way that network services are deployed in the underlying network infrastructure. The decoupling of network functions from dedicated middleboxes into software entities has led the Service Providers to offer highly specialized services tailored to the needs of the end users. However, in order to achieve the high performance that the expensive hardware appliances can guarantee, an efficient virtualized network functions (VNF) deployment should be performed. This paper proposes a novel VNF placement approach with the goal to minimize the deployment cost and maximize the achieved throughput. Results reveal the need of considering the throughput degradation when consolidating multiple VNFs on the same server in order to increase the overall performance.
{"title":"Considerations for a Successful Network Service Chain Deployment","authors":"Aris Leivadeas, M. Falkner, I. Lambadaris, G. Kesidis, Chung-Horng Lung, M. Ibnkahla","doi":"10.1109/NETSOFT.2018.8459934","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8459934","url":null,"abstract":"Network Functions Virtualization (NFV) along with the Service Chaining paradigm have changed the way that network services are deployed in the underlying network infrastructure. The decoupling of network functions from dedicated middleboxes into software entities has led the Service Providers to offer highly specialized services tailored to the needs of the end users. However, in order to achieve the high performance that the expensive hardware appliances can guarantee, an efficient virtualized network functions (VNF) deployment should be performed. This paper proposes a novel VNF placement approach with the goal to minimize the deployment cost and maximize the achieved throughput. Results reveal the need of considering the throughput degradation when consolidating multiple VNFs on the same server in order to increase the overall performance.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134363485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}