Pub Date : 2016-04-25DOI: 10.1109/NOMS.2016.7502824
Samaneh Tajalizadehkhoob, Maciej Korczyński, Arman Noroozian, C. Gañán, M. V. Eeten
Hosting services are associated with various security threats, yet the market has barely been studied empirically. Most security research has relied on routing data and equates providers with Autonomous Systems, ignoring the complexity and heterogeneity of the market. To overcome these limitations, we combined passive DNS data with WHOIS data to identify providers and some of their properties. We found 45,434 hosting providers, spread around a median address space size of 1,517 IP addresses. There is surprisingly little consolidation in the market, even though its services seem amenable to economies of scale. We applied cluster analysis on several measurable characteristics of providers. This uncovered a diverse set of business profiles and an indication of what fraction of the market fits each profile. The profiles are associated with significant differences in security performance, as measured by the uptime of phishing sites. This suggests the approach provides an effective way for security researchers to take the heterogeneity of the market into account.
{"title":"Apples, oranges and hosting providers: Heterogeneity and security in the hosting market","authors":"Samaneh Tajalizadehkhoob, Maciej Korczyński, Arman Noroozian, C. Gañán, M. V. Eeten","doi":"10.1109/NOMS.2016.7502824","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502824","url":null,"abstract":"Hosting services are associated with various security threats, yet the market has barely been studied empirically. Most security research has relied on routing data and equates providers with Autonomous Systems, ignoring the complexity and heterogeneity of the market. To overcome these limitations, we combined passive DNS data with WHOIS data to identify providers and some of their properties. We found 45,434 hosting providers, spread around a median address space size of 1,517 IP addresses. There is surprisingly little consolidation in the market, even though its services seem amenable to economies of scale. We applied cluster analysis on several measurable characteristics of providers. This uncovered a diverse set of business profiles and an indication of what fraction of the market fits each profile. The profiles are associated with significant differences in security performance, as measured by the uptime of phishing sites. This suggests the approach provides an effective way for security researchers to take the heterogeneity of the market into account.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115296980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-25DOI: 10.1109/NOMS.2016.7502898
Basar Daldal, Ibrahim Bilgin, Dogac Basaran, Selin Metin
WebRTC-based applications are assumed to be based mostly on peer-to-peer communication, where an instance of the application is talking to another instance. However, this is not always the case: a WebRTC-based application communicating with a legacy VoIP device or Media Server like a Video Conference Server is also very common. The ability to make both types of communications (WebRTC to WebRTC and WebRTC to Legacy VoIP) is a differentiating factor for a WebRTC product. This paper makes a proposal on how this could be achieved on the signaling layer by leveraging an industry standard method such as the RESTful Web Services.
基于webrtc的应用程序被认为主要基于点对点通信,其中应用程序的一个实例与另一个实例进行通信。然而,情况并非总是如此:基于webbrtc的应用程序与传统VoIP设备或媒体服务器(如视频会议服务器)通信也很常见。能够进行两种类型的通信(WebRTC到WebRTC和WebRTC到传统VoIP)是WebRTC产品的一个区别因素。本文就如何利用诸如RESTful Web Services之类的行业标准方法在信令层上实现这一点提出了建议。
{"title":"Using Web Services for WebRTC signaling interoperability","authors":"Basar Daldal, Ibrahim Bilgin, Dogac Basaran, Selin Metin","doi":"10.1109/NOMS.2016.7502898","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502898","url":null,"abstract":"WebRTC-based applications are assumed to be based mostly on peer-to-peer communication, where an instance of the application is talking to another instance. However, this is not always the case: a WebRTC-based application communicating with a legacy VoIP device or Media Server like a Video Conference Server is also very common. The ability to make both types of communications (WebRTC to WebRTC and WebRTC to Legacy VoIP) is a differentiating factor for a WebRTC product. This paper makes a proposal on how this could be achieved on the signaling layer by leveraging an industry standard method such as the RESTful Web Services.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116898368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-25DOI: 10.1109/NOMS.2016.7502978
Maryam Barshan, Hendrik Moens, B. Volckaert, F. Turck
Due to the predictable nature of network transfers in media production industry, advance bandwidth reservation results in higher bandwidth utilization and improved network performance. However, in unreliable networks, this may fail. As a first provisional stage, deploying protection mechanisms ensures that the schedule remains valid when the system is in operation. Constant monitoring and modification is also required in order to be capable of dynamically adapting the network to changing conditions. In this paper, we propose an efficient dual approach consisting of two processes. First, a schedule is produced by a resilient advance reservation algorithm. Then, the generated schedule is continually updated over time using a runtime adaptation approach. As this step uses the interconnecting network links' leftover capacity, following this approach leads to increased performance in case of steady network conditions, or neutral performance when transmitting admitted requests in uncertain network conditions.
{"title":"Design of a dynamic adaptive reservation system in media production networks","authors":"Maryam Barshan, Hendrik Moens, B. Volckaert, F. Turck","doi":"10.1109/NOMS.2016.7502978","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502978","url":null,"abstract":"Due to the predictable nature of network transfers in media production industry, advance bandwidth reservation results in higher bandwidth utilization and improved network performance. However, in unreliable networks, this may fail. As a first provisional stage, deploying protection mechanisms ensures that the schedule remains valid when the system is in operation. Constant monitoring and modification is also required in order to be capable of dynamically adapting the network to changing conditions. In this paper, we propose an efficient dual approach consisting of two processes. First, a schedule is produced by a resilient advance reservation algorithm. Then, the generated schedule is continually updated over time using a runtime adaptation approach. As this step uses the interconnecting network links' leftover capacity, following this approach leads to increased performance in case of steady network conditions, or neutral performance when transmitting admitted requests in uncertain network conditions.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124914300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-25DOI: 10.1109/NOMS.2016.7502920
T. Čejka, Radek Krejcí
Software Defined Networking (SDN) became a popular concept where a flexible network architecture is required. One of the widely used approaches to SDN is based on the OpenFlow (OF) protocol that allows controllers to configure OF capable network switches. The OF protocol is focused on a flow-based control of a switch. Besides OF itself, Open Networking Foundation (ONF) has introduced the OF-CONFIG protocol. In contrast, the aim of OF-CONFIG is the configuration of more durable parameters of the controlled switch. However, Open vSwitch (OVS), as the most popular OF switch implementation, uses its own configuration protocol instead of OF-CONFIG. This paper presents results of our analysis of OF-CONFIG and describes design and development of its missing reference implementation. Furthermore, it extends OVS with the OF-CONFIG support, so it provides an opportunity for OF-CONFIG to be more widely used. Our experiences from the analysis and implementation deliver useful feedback to ONF people for further development of OF-CONFIG.
{"title":"Configuration of open vSwitch using OF-CONFIG","authors":"T. Čejka, Radek Krejcí","doi":"10.1109/NOMS.2016.7502920","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502920","url":null,"abstract":"Software Defined Networking (SDN) became a popular concept where a flexible network architecture is required. One of the widely used approaches to SDN is based on the OpenFlow (OF) protocol that allows controllers to configure OF capable network switches. The OF protocol is focused on a flow-based control of a switch. Besides OF itself, Open Networking Foundation (ONF) has introduced the OF-CONFIG protocol. In contrast, the aim of OF-CONFIG is the configuration of more durable parameters of the controlled switch. However, Open vSwitch (OVS), as the most popular OF switch implementation, uses its own configuration protocol instead of OF-CONFIG. This paper presents results of our analysis of OF-CONFIG and describes design and development of its missing reference implementation. Furthermore, it extends OVS with the OF-CONFIG support, so it provides an opportunity for OF-CONFIG to be more widely used. Our experiences from the analysis and implementation deliver useful feedback to ONF people for further development of OF-CONFIG.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123718009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-25DOI: 10.1109/NOMS.2016.7502859
R. Xavier, Hendrik Moens, B. Volckaert, F. Turck
Cloud computing is growing in adoption for different services previously supported by traditional infrastructure, including dedicated hardware setups. One of these cloud-enabled services is real-time Audio/Video collaboration. Existing cloud-based collaboration systems generally function on a best-effort basis, and offer little to no delivery and quality guarantees. High-quality business-focused solutions are therefore offered using dedicated and often manually configured hardware. In this paper, we present resource provisioning algorithms to provide the mentioned elasticity under strict quality requirements. These algorithms are evaluated, using an extended version of the CloudSim simulator, making use of realistic collaborative meeting patterns prepared to deal with seasonality and usage prediction. Our results show that the algorithms improve costs by up to 98.38% when compared with previously designed more naive approaches and with an effectiveness of 99.9% in meeting A/V collaboration setup deadlines.
{"title":"Adaptive virtual machine allocation algorithms for cloud-hosted elastic media services","authors":"R. Xavier, Hendrik Moens, B. Volckaert, F. Turck","doi":"10.1109/NOMS.2016.7502859","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502859","url":null,"abstract":"Cloud computing is growing in adoption for different services previously supported by traditional infrastructure, including dedicated hardware setups. One of these cloud-enabled services is real-time Audio/Video collaboration. Existing cloud-based collaboration systems generally function on a best-effort basis, and offer little to no delivery and quality guarantees. High-quality business-focused solutions are therefore offered using dedicated and often manually configured hardware. In this paper, we present resource provisioning algorithms to provide the mentioned elasticity under strict quality requirements. These algorithms are evaluated, using an extended version of the CloudSim simulator, making use of realistic collaborative meeting patterns prepared to deal with seasonality and usage prediction. Our results show that the algorithms improve costs by up to 98.38% when compared with previously designed more naive approaches and with an effectiveness of 99.9% in meeting A/V collaboration setup deadlines.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115089834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-25DOI: 10.1109/NOMS.2016.7502874
J. Sarubbi, C. M. Silva
In this work we propose Delta-r, a new greedy heuristic for solving the allocation of roadside units in order to meet a Δρ2ρ1-Deployment. The Δρ2ρ1-Deployment is a metric for specifying minimal levels of performance from the infrastructure supporting vehicular networks. As far as we are concerned, this is the first QoS-bounded deployment strategy considering both the contact probability, and the contact duration. We compare Delta-r to two baselines: DL allocates the roadside units at the densest locations of the road network, while Delta-g uses the absolute V2I contact time. Differently from Delta-r, our proposal evaluates the deployment performance when using the relative V2I contact time considering vehicles and locations of the road network. Our results demonstrate Delta-r requiring less roadside units to achieve the same performance of the infrastructure supporting the V2I communication.
{"title":"Delta-r: A novel and more economic strategy for allocating the roadside infrastructure in vehicular networks with guaranteed levels of performance","authors":"J. Sarubbi, C. M. Silva","doi":"10.1109/NOMS.2016.7502874","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502874","url":null,"abstract":"In this work we propose Delta-r, a new greedy heuristic for solving the allocation of roadside units in order to meet a Δρ2ρ1-Deployment. The Δρ2ρ1-Deployment is a metric for specifying minimal levels of performance from the infrastructure supporting vehicular networks. As far as we are concerned, this is the first QoS-bounded deployment strategy considering both the contact probability, and the contact duration. We compare Delta-r to two baselines: DL allocates the roadside units at the densest locations of the road network, while Delta-g uses the absolute V2I contact time. Differently from Delta-r, our proposal evaluates the deployment performance when using the relative V2I contact time considering vehicles and locations of the road network. Our results demonstrate Delta-r requiring less roadside units to achieve the same performance of the infrastructure supporting the V2I communication.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"78 48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115569692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-25DOI: 10.1109/NOMS.2016.7502800
Amir Nahir, A. Orda, D. Raz
A fundamental capability of cloud computing is elasticity, i.e., the ability to dynamically change the amount of allocated resources. This is typically done by adjusting the number of Virtual Machines (VMs) running a service based on the current demand for that service. For large services, centralized management is impractical and distributed methods are employed. In such settings, no single component has full information on the overall demand and service quality, thus elasticity becomes a real challenge. We address this challenge by proposing a novel elasticity scheme that enables fully distributed management of large cloud services. Our scheme is based on three main components, namely, a task assignment policy, a VM scale-up policy and a VM scale-down policy. The task assignment policy strives to “pack” VMs while maintaining SLA requirements. The VM scale-up policy is based on local activation of new VMs and the VM scale-down policy is based on self-deactivation of VMs that are idle for some duration of time. Through simulations and an implementation we establish that our scheme quickly adapts to changes in job arrival rates and minimizes the number of active VMs so as to reduce the operational costs of the service, while adhering to strict SLA requirements.
{"title":"Reversing the supermarket: A distributed approach for handling elasticity in the cloud","authors":"Amir Nahir, A. Orda, D. Raz","doi":"10.1109/NOMS.2016.7502800","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502800","url":null,"abstract":"A fundamental capability of cloud computing is elasticity, i.e., the ability to dynamically change the amount of allocated resources. This is typically done by adjusting the number of Virtual Machines (VMs) running a service based on the current demand for that service. For large services, centralized management is impractical and distributed methods are employed. In such settings, no single component has full information on the overall demand and service quality, thus elasticity becomes a real challenge. We address this challenge by proposing a novel elasticity scheme that enables fully distributed management of large cloud services. Our scheme is based on three main components, namely, a task assignment policy, a VM scale-up policy and a VM scale-down policy. The task assignment policy strives to “pack” VMs while maintaining SLA requirements. The VM scale-up policy is based on local activation of new VMs and the VM scale-down policy is based on self-deactivation of VMs that are idle for some duration of time. Through simulations and an implementation we establish that our scheme quickly adapts to changes in job arrival rates and minimizes the number of active VMs so as to reduce the operational costs of the service, while adhering to strict SLA requirements.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122903590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-25DOI: 10.1109/NOMS.2016.7502861
S. Hameed, Usman Murad Jamali, Adnan Samad
Near Field Communication (NFC) is inherently vulnerable to eavesdropping and proximity hijacking attacks. NFC standards itself lack built-in security features against eavesdropping for all the modes of communication in NFC-ecosystem. This drives the application developers to implement customize security features on their own. These non-standard solutions in turn result in the system's security against vulnerabilities being subject to the developer's capability of designing a secure solution. Clearly, this model is a limiting factor in the widespread adoption and deployment of NFC applications. In this paper we propose a standard Encryption Record Type Definition (ERTD) to provide confidentiality to NFC Data Exchange format (NDEF). Subsequently, we develop a fully compliant prototype of our ERTD as a lightweight plug and play confidentiality middleware in the existing NFC communication architecture. Finally, we perform an in-depth performance evaluation, of different confidentiality related primitives that focuses on processing latency and data overheads.
{"title":"Protecting NFC data exchange against eavesdropping with encryption record type definition","authors":"S. Hameed, Usman Murad Jamali, Adnan Samad","doi":"10.1109/NOMS.2016.7502861","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502861","url":null,"abstract":"Near Field Communication (NFC) is inherently vulnerable to eavesdropping and proximity hijacking attacks. NFC standards itself lack built-in security features against eavesdropping for all the modes of communication in NFC-ecosystem. This drives the application developers to implement customize security features on their own. These non-standard solutions in turn result in the system's security against vulnerabilities being subject to the developer's capability of designing a secure solution. Clearly, this model is a limiting factor in the widespread adoption and deployment of NFC applications. In this paper we propose a standard Encryption Record Type Definition (ERTD) to provide confidentiality to NFC Data Exchange format (NDEF). Subsequently, we develop a fully compliant prototype of our ERTD as a lightweight plug and play confidentiality middleware in the existing NFC communication architecture. Finally, we perform an in-depth performance evaluation, of different confidentiality related primitives that focuses on processing latency and data overheads.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129568859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-25DOI: 10.1109/NOMS.2016.7502966
Karim Benzidane, Hassan El Alloussi, Othman El Warrak, L. Fetjah, Said Jai-Andaloussi, A. Sekkaki
As the adoption of Cloud Computing is growing exponentially, a huge sheer amount of data is generated therefore needing to be processed in order to control efficiently what is going within the infrastructure, and also to respond effectively and promptly to security threats. Herein, we provide a highly scalable plugin based and comprehensive solution in order to have a real-time monitoring by reducing the impact of an attack or a particular issue in the overall distributed infrastructure. This work covers a bigger scope in infrastructure security by monitoring all devices that generate log files or generate network traffic. By applying different Big Data techniques for data analysis, we can ensure a responsive solution to any problem (security or other) within the infrastructure and acting accordingly.
{"title":"Toward a cloud-based security intelligence with big data processing","authors":"Karim Benzidane, Hassan El Alloussi, Othman El Warrak, L. Fetjah, Said Jai-Andaloussi, A. Sekkaki","doi":"10.1109/NOMS.2016.7502966","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502966","url":null,"abstract":"As the adoption of Cloud Computing is growing exponentially, a huge sheer amount of data is generated therefore needing to be processed in order to control efficiently what is going within the infrastructure, and also to respond effectively and promptly to security threats. Herein, we provide a highly scalable plugin based and comprehensive solution in order to have a real-time monitoring by reducing the impact of an attack or a particular issue in the overall distributed infrastructure. This work covers a bigger scope in infrastructure security by monitoring all devices that generate log files or generate network traffic. By applying different Big Data techniques for data analysis, we can ensure a responsive solution to any problem (security or other) within the infrastructure and acting accordingly.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128437966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-25DOI: 10.1109/NOMS.2016.7503004
Marouen Mechtri, I. B. Yahia, D. Zeghlache
This paper presents an underlying framework to support and accelerate the production of applications and services in the context of programmable networks (SDN and NFV, clouds). The proposed framework addresses moreover the 5G KPI of “reducing the average service creation time from 90 hours to 90 minutes” as declared by 5G-PPP association in the early of 2015 among other KPIs. The proposed framework relies on SDN, NFV and Cloud principles and technologies and proposes extensions towards the end to end abstraction that is required for automation of service production. A Service Manager Architecture fulfilling the agility, acceleration and automation requirements is presented along with its relationships and interfaces with the applications and network levels. An application requiring network services, expressed in a network service descriptor, is used to illustrate the architecture usage and benefits and highlights the remaining future research needs and trails.
{"title":"Agile service manager for 5G","authors":"Marouen Mechtri, I. B. Yahia, D. Zeghlache","doi":"10.1109/NOMS.2016.7503004","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7503004","url":null,"abstract":"This paper presents an underlying framework to support and accelerate the production of applications and services in the context of programmable networks (SDN and NFV, clouds). The proposed framework addresses moreover the 5G KPI of “reducing the average service creation time from 90 hours to 90 minutes” as declared by 5G-PPP association in the early of 2015 among other KPIs. The proposed framework relies on SDN, NFV and Cloud principles and technologies and proposes extensions towards the end to end abstraction that is required for automation of service production. A Service Manager Architecture fulfilling the agility, acceleration and automation requirements is presented along with its relationships and interfaces with the applications and network levels. An application requiring network services, expressed in a network service descriptor, is used to illustrate the architecture usage and benefits and highlights the remaining future research needs and trails.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130298713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}