Pub Date : 2015-04-13DOI: 10.1109/NETSOFT.2015.7116147
Amin Aflatoonian, A. Bouabdallah, K. Guillouard, Vincent Catros, J. Bonnin
Software Defined Networking (SDN) is supposed to bring flexibility, dynamicity and automation to today's network through a logically centralized network controller. We argue that reaching SDN's full capacities requires however the development of standardized programming capabilities on its top. In this paper we introduce “Bring Your Own Control” (BYOC) as a new concept providing a convenient framework structuring the openness of the SDN on its northbound side. We derive from the lifecycle characterizing the services deployed in an SDN, the parts of services the control of which may be delegated by the operator to external customers through dedicated application programming interfaces (API) located in the northbound interface (NBI). We argue that the exploitation of such services may noticeably be refined by the operator through various business models monetizing the openness of the SDN following the new paradigm of “Earn as Your Bring” (EaYB). We propose an analysis of BYOC and we illustrate our approach with several use cases.
软件定义网络(SDN)旨在通过逻辑上集中的网络控制器为当今的网络带来灵活性、动态性和自动化。我们认为,达到SDN的全部容量需要在其基础上开发标准化的编程能力。在本文中,我们介绍了“自带控制”(Bring Your Own Control, BYOC)这个新概念,它提供了一个方便的框架来构建SDN北向的开放性。我们从描述部署在SDN中的服务的生命周期中得出,服务的控制部分可以由运营商通过位于北向接口(NBI)中的专用应用程序编程接口(API)委托给外部客户。我们认为,这些服务的开发可以由运营商通过各种商业模式进行明显的改进,这些商业模式将SDN的开放性货币化,遵循“按你带来的收入”(EaYB)的新范式。我们提出了对BYOC的分析,并通过几个用例说明了我们的方法。
{"title":"BYOC: Bring Your Own Control a new concept to monetize SDN's openness","authors":"Amin Aflatoonian, A. Bouabdallah, K. Guillouard, Vincent Catros, J. Bonnin","doi":"10.1109/NETSOFT.2015.7116147","DOIUrl":"https://doi.org/10.1109/NETSOFT.2015.7116147","url":null,"abstract":"Software Defined Networking (SDN) is supposed to bring flexibility, dynamicity and automation to today's network through a logically centralized network controller. We argue that reaching SDN's full capacities requires however the development of standardized programming capabilities on its top. In this paper we introduce “Bring Your Own Control” (BYOC) as a new concept providing a convenient framework structuring the openness of the SDN on its northbound side. We derive from the lifecycle characterizing the services deployed in an SDN, the parts of services the control of which may be delegated by the operator to external customers through dedicated application programming interfaces (API) located in the northbound interface (NBI). We argue that the exploitation of such services may noticeably be refined by the operator through various business models monetizing the openness of the SDN following the new paradigm of “Earn as Your Bring” (EaYB). We propose an analysis of BYOC and we illustrate our approach with several use cases.","PeriodicalId":426452,"journal":{"name":"Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft)","volume":"23 58","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120841813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-04-13DOI: 10.1109/NETSOFT.2015.7116178
Simon Oechsner, A. Ripke
In the context of virtualization and cloud computing, a currently interesting topic is the movement of network functions into the cloud. Since these Virtualized Network Functions have high performance and availability requirements, the placement and resilient deployment of these functions are important issues. In this paper, we present a real-world mechanism implemented for OpenStack that supports arbitrary placement functions for performance optimization and resilience provisioning. In addition, we provide an example of how this mechanism can be used in practice.
{"title":"Flexible support of VNF placement functions in OpenStack","authors":"Simon Oechsner, A. Ripke","doi":"10.1109/NETSOFT.2015.7116178","DOIUrl":"https://doi.org/10.1109/NETSOFT.2015.7116178","url":null,"abstract":"In the context of virtualization and cloud computing, a currently interesting topic is the movement of network functions into the cloud. Since these Virtualized Network Functions have high performance and availability requirements, the placement and resilient deployment of these functions are important issues. In this paper, we present a real-world mechanism implemented for OpenStack that supports arbitrary placement functions for performance optimization and resilience provisioning. In addition, we provide an example of how this mechanism can be used in practice.","PeriodicalId":426452,"journal":{"name":"Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125334878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Network anti-virus (AV) solutions are the first line of defense against malicious software. Traditional proxy-based network anti-virus solutions with store-scan-forward techniques decrease network performance and consume massive amounts of memory. Therefore, traditional solutions are not easily adaptable for Network Function Virtualization (NFV). This paper details the work on a novel virus scanning solution for NFV, called StreamAV. It does not require a proxy and maintains high network performance with less memory usage. StreamAV conducts policy matching on streams, rather than on complete files. This eliminates buffering, thereby accelerating traffic and requiring far less memory than solutions that scan complete files. The prototype was 40 times faster than its closest open source competitor, while its memory consumption was only a fraction of that of this competitor. Coverage was 100% with random test samples.
网络反病毒(AV)解决方案是抵御恶意软件的第一道防线。传统的基于代理的网络防病毒解决方案采用存储-前向扫描技术,会降低网络性能并消耗大量内存。因此,传统的解决方案不容易适应NFV (Network Function Virtualization)。本文详细介绍了一种新的NFV病毒扫描解决方案,称为StreamAV。它不需要代理,并以较少的内存使用保持较高的网络性能。StreamAV对流进行策略匹配,而不是对完整的文件进行匹配。这消除了缓冲,从而加速了流量,并且比扫描完整文件的解决方案所需的内存少得多。它的原型比它最接近的开源竞争对手快40倍,而它的内存消耗只是这个竞争对手的一小部分。随机测试样本的覆盖率为100%。
{"title":"Fast proxyless stream-based anti-virus for Network Function Virtualization","authors":"Chia-Nan Kao, Salim Si, N. Huang, I-Ju Liao, Rong-Tai Liu, Hsien-Wei Hung","doi":"10.1109/NETSOFT.2015.7116154","DOIUrl":"https://doi.org/10.1109/NETSOFT.2015.7116154","url":null,"abstract":"Network anti-virus (AV) solutions are the first line of defense against malicious software. Traditional proxy-based network anti-virus solutions with store-scan-forward techniques decrease network performance and consume massive amounts of memory. Therefore, traditional solutions are not easily adaptable for Network Function Virtualization (NFV). This paper details the work on a novel virus scanning solution for NFV, called StreamAV. It does not require a proxy and maintains high network performance with less memory usage. StreamAV conducts policy matching on streams, rather than on complete files. This eliminates buffering, thereby accelerating traffic and requiring far less memory than solutions that scan complete files. The prototype was 40 times faster than its closest open source competitor, while its memory consumption was only a fraction of that of this competitor. Coverage was 100% with random test samples.","PeriodicalId":426452,"journal":{"name":"Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122720889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-04-13DOI: 10.1109/NETSOFT.2015.7116127
F. Callegati, W. Cerroni, C. Contoli, G. Santandrea
This manuscript investigates the issue of implementing chains of network functions in a “softwarized” environment where edge network middle-boxes are replaced by software appliances running in virtual machines within a data center. The primary goal is to show that this approach allows space and time diversity in service chaining, with a higher degree of dynamism and flexibility with respect to conventional hardware-based architectures. The manuscript describes implementation alternatives of the virtual function chaining in a SDN scenario, showing that both layer 2 and layer 3 approaches are functionally viable. A proof-of-concept implementation with the Mininet emulation platform is then presented to provide a practical example of the feasibility and degree of complexity of such approaches.
{"title":"Dynamic chaining of Virtual Network Functions in cloud-based edge networks","authors":"F. Callegati, W. Cerroni, C. Contoli, G. Santandrea","doi":"10.1109/NETSOFT.2015.7116127","DOIUrl":"https://doi.org/10.1109/NETSOFT.2015.7116127","url":null,"abstract":"This manuscript investigates the issue of implementing chains of network functions in a “softwarized” environment where edge network middle-boxes are replaced by software appliances running in virtual machines within a data center. The primary goal is to show that this approach allows space and time diversity in service chaining, with a higher degree of dynamism and flexibility with respect to conventional hardware-based architectures. The manuscript describes implementation alternatives of the virtual function chaining in a SDN scenario, showing that both layer 2 and layer 3 approaches are functionally viable. A proof-of-concept implementation with the Mininet emulation platform is then presented to provide a practical example of the feasibility and degree of complexity of such approaches.","PeriodicalId":426452,"journal":{"name":"Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft)","volume":"244 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122097651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-04-13DOI: 10.1109/NETSOFT.2015.7116158
Jeremias Blendin, Julius Rückert, Tobias Volk, D. Hausheer
Internet Service Providers (ISPs) need to cope with a growing amount of over-the-top (OTT) traffic, often without a share in the high revenues of the content providers. To achieve an efficient global delivery of content, today content providers usually employ content delivery networks (CDNs) located at the edge of ISP networks from where content is delivered to end users via IP unicast. Many OTT services could benefit from a better support within the ISP's network, e.g. by packet duplication to deliver OTT video streams. While traditional solutions like IP multicast did not prevail, SDN-based alternatives have started to gain attention recently. In contrast to traditional approaches, SDN enables ISPs to support network services in a more manageable and flexible manner. However, the approaches proposed so far are quite rigid and keep state at every network device, independent of the multicast group size. To alleviate this problem, this paper proposes a new approach termed ASDM enabling ISPs to dynamically adjust the tradeoff between bandwidth and state for any multicast service. It is shown that, given ISP-defined bandwidth and state cost functions, the optimal parameter for ASDM can be derived and applied for a transparent multicast-to-unicast conversion achieving the desired characteristics. The proposed approach results in up to 30% bandwidth reduction compared to unicast while using only a seventh of the network state compared to traditional multicast.
{"title":"Adaptive Software Defined Multicast","authors":"Jeremias Blendin, Julius Rückert, Tobias Volk, D. Hausheer","doi":"10.1109/NETSOFT.2015.7116158","DOIUrl":"https://doi.org/10.1109/NETSOFT.2015.7116158","url":null,"abstract":"Internet Service Providers (ISPs) need to cope with a growing amount of over-the-top (OTT) traffic, often without a share in the high revenues of the content providers. To achieve an efficient global delivery of content, today content providers usually employ content delivery networks (CDNs) located at the edge of ISP networks from where content is delivered to end users via IP unicast. Many OTT services could benefit from a better support within the ISP's network, e.g. by packet duplication to deliver OTT video streams. While traditional solutions like IP multicast did not prevail, SDN-based alternatives have started to gain attention recently. In contrast to traditional approaches, SDN enables ISPs to support network services in a more manageable and flexible manner. However, the approaches proposed so far are quite rigid and keep state at every network device, independent of the multicast group size. To alleviate this problem, this paper proposes a new approach termed ASDM enabling ISPs to dynamically adjust the tradeoff between bandwidth and state for any multicast service. It is shown that, given ISP-defined bandwidth and state cost functions, the optimal parameter for ASDM can be derived and applied for a transparent multicast-to-unicast conversion achieving the desired characteristics. The proposed approach results in up to 30% bandwidth reduction compared to unicast while using only a seventh of the network state compared to traditional multicast.","PeriodicalId":426452,"journal":{"name":"Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114702079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-04-13DOI: 10.1109/NETSOFT.2015.7116122
K. Suksomboon, M. Fukushima, M. Hayashi, Rathachai Chawuthai, Hideaki Takeda
By decoupling the network function from the underlying dedicated hardware, enterprises can reap the benefit of outsourcing network functions to the cloud. Due to a lack of analytical tools, one cannot simply justify the worthiness of outsourcing network functions. This paper proposes a decision support framework for network function outsourcing, called Location-aware Network Function Outsourcing (LawNFO), aiming to identify which network function is worth to be outsourced to the cloud. LawNFO constructs a network-function graph and maps the cost of network function processing units and the data transmission between any network-function pairs onto the graph. The network function outsourcing problem is formulated as an optimization problem targeting on the minimum network cost. To solve the optimization problem based on the graph input, we develop an efficient and fast heuristic algorithm, called Node-weighted Contraction (NowCont), that encompasses the graph partitioning and graph augmentation techniques. This paper performs simulation to evaluate the performance of LawNFO with NowCont algorithm in two aspects: 1) the closeness ratio to the optimal solutions and 2) the network cost comparing to that of all-in-house and most-in-cloud network function placement models. The simulation results illustrate that the NowCont algorithm yields the solution closest to the optimal solution. The evaluation through two use cases show that LawNFO is of benefit to the enterprises for the decision of network function outsourcing.
{"title":"LawNFO: A decision framework for optimal location-aware network function outsourcing","authors":"K. Suksomboon, M. Fukushima, M. Hayashi, Rathachai Chawuthai, Hideaki Takeda","doi":"10.1109/NETSOFT.2015.7116122","DOIUrl":"https://doi.org/10.1109/NETSOFT.2015.7116122","url":null,"abstract":"By decoupling the network function from the underlying dedicated hardware, enterprises can reap the benefit of outsourcing network functions to the cloud. Due to a lack of analytical tools, one cannot simply justify the worthiness of outsourcing network functions. This paper proposes a decision support framework for network function outsourcing, called Location-aware Network Function Outsourcing (LawNFO), aiming to identify which network function is worth to be outsourced to the cloud. LawNFO constructs a network-function graph and maps the cost of network function processing units and the data transmission between any network-function pairs onto the graph. The network function outsourcing problem is formulated as an optimization problem targeting on the minimum network cost. To solve the optimization problem based on the graph input, we develop an efficient and fast heuristic algorithm, called Node-weighted Contraction (NowCont), that encompasses the graph partitioning and graph augmentation techniques. This paper performs simulation to evaluate the performance of LawNFO with NowCont algorithm in two aspects: 1) the closeness ratio to the optimal solutions and 2) the network cost comparing to that of all-in-house and most-in-cloud network function placement models. The simulation results illustrate that the NowCont algorithm yields the solution closest to the optimal solution. The evaluation through two use cases show that LawNFO is of benefit to the enterprises for the decision of network function outsourcing.","PeriodicalId":426452,"journal":{"name":"Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127931844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-04-13DOI: 10.1109/NETSOFT.2015.7116168
J. Garay, J. Matías, A. Mendiola, J. Astorga, E. Jacob
The service delivery has evolved during the last years. The introduction of Software Defined Networking (SDN) and Network Functions Virtualisation (NFV) has driven network programmability to foster the innovation in the provisioning of new services. The orchestration and dynamic deployment of resources for service delivery are relevant topics covered by this demonstration.
{"title":"Self-deploying Service Graphs over ELwUD (EHU-OEF Lightweight UNIFY Domain)","authors":"J. Garay, J. Matías, A. Mendiola, J. Astorga, E. Jacob","doi":"10.1109/NETSOFT.2015.7116168","DOIUrl":"https://doi.org/10.1109/NETSOFT.2015.7116168","url":null,"abstract":"The service delivery has evolved during the last years. The introduction of Software Defined Networking (SDN) and Network Functions Virtualisation (NFV) has driven network programmability to foster the innovation in the provisioning of new services. The orchestration and dynamic deployment of resources for service delivery are relevant topics covered by this demonstration.","PeriodicalId":426452,"journal":{"name":"Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132226409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-04-13DOI: 10.1109/NETSOFT.2015.7116191
N. Makris, Christos Zarafetas, Spyros Kechagias, T. Korakis, I. Seskar, L. Tassiulas
The lessons already learned from the existing protocols operation are taken into deep consideration during the standardization activities of the potential technologies opted for the future 5th Generation mobile networks. Prior research on wireless technologies in general has clearly shown the need for open programmable experimental facilities which can be used for the implementation and evaluation of novel algorithms and ideas under real world settings, even directly comparable to existing technologies and methodologies. Nevertheless, provisioning of such testbed platforms mandates the respective tools which will enable access to the testbed resources and will expose the maximum possible flexibility in configuring them. In this work, we present our efforts in building such a facility, along with the tools and services that cope with such requirements. The facility upon which we build is the long-established NITOS wireless testbed, which is offering commercial as well as open source LTE components in a 24/7 basis.
{"title":"Enabling open access to LTE network components; the NITOS testbed paradigm","authors":"N. Makris, Christos Zarafetas, Spyros Kechagias, T. Korakis, I. Seskar, L. Tassiulas","doi":"10.1109/NETSOFT.2015.7116191","DOIUrl":"https://doi.org/10.1109/NETSOFT.2015.7116191","url":null,"abstract":"The lessons already learned from the existing protocols operation are taken into deep consideration during the standardization activities of the potential technologies opted for the future 5th Generation mobile networks. Prior research on wireless technologies in general has clearly shown the need for open programmable experimental facilities which can be used for the implementation and evaluation of novel algorithms and ideas under real world settings, even directly comparable to existing technologies and methodologies. Nevertheless, provisioning of such testbed platforms mandates the respective tools which will enable access to the testbed resources and will expose the maximum possible flexibility in configuring them. In this work, we present our efforts in building such a facility, along with the tools and services that cope with such requirements. The facility upon which we build is the long-established NITOS wireless testbed, which is offering commercial as well as open source LTE components in a 24/7 basis.","PeriodicalId":426452,"journal":{"name":"Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132565091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-04-13DOI: 10.1109/NETSOFT.2015.7116165
S. Sadri, Yosr Jarraya, A. Eghtesadi, M. Debbabi
Virtual machine migration is an essential capability that supports cloud service elasticity. However, there is a big concern on what happens to the security policy associated with the migrated machine. Recently, Software Defined Networking (SDN) has gained momentum in both research and industry. It has shown great potential to be used in cloud data centers, particularly for inter-domains migration of virtual machines. In this paper, we propose a novel framework, to be deployed in an SDN environment that coordinates the mobility of the associated security policy along with the migrated virtual machine. We implemented our framework into a prototype application, called MigApp that runs on top of SDN controllers. Our application interacts with the virtual machine monitor and other instances of MigApp through messaging system to achieve security migration. In order to evaluate our framework, we integrate our application with the Floodlight controller and use it with a simulation environment.
{"title":"Towards migrating security policies of virtual machines in Software Defined Networks","authors":"S. Sadri, Yosr Jarraya, A. Eghtesadi, M. Debbabi","doi":"10.1109/NETSOFT.2015.7116165","DOIUrl":"https://doi.org/10.1109/NETSOFT.2015.7116165","url":null,"abstract":"Virtual machine migration is an essential capability that supports cloud service elasticity. However, there is a big concern on what happens to the security policy associated with the migrated machine. Recently, Software Defined Networking (SDN) has gained momentum in both research and industry. It has shown great potential to be used in cloud data centers, particularly for inter-domains migration of virtual machines. In this paper, we propose a novel framework, to be deployed in an SDN environment that coordinates the mobility of the associated security policy along with the migrated virtual machine. We implemented our framework into a prototype application, called MigApp that runs on top of SDN controllers. Our application interacts with the virtual machine monitor and other instances of MigApp through messaging system to achieve security migration. In order to evaluate our framework, we integrate our application with the Floodlight controller and use it with a simulation environment.","PeriodicalId":426452,"journal":{"name":"Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129964626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-04-13DOI: 10.1109/NETSOFT.2015.7116139
Gabriela Gheorghe, T. Avanesov, M. Palattella, T. Engel, C. Popoviciu
Software-defined deployments are growing into data center and enterprise network infrastructures. The typical promises of software-defined networks (SDN) are improved time for market, decreased risk and operational costs for services, flexibility and unified management. However, little is known and shared about how to actually manage an SDN network, especially in localising underperforming network paths (what we call “troubleshooting”). We describe a novel approach to ease large network troubleshooting by leveraging SDN features and incorporating distributed monitoring of network traffic. We suggest SDN-RADAR, a tool that can help network administrators understand which is the most likely faulty network link. To the best of our knowledge this is the first troubleshooting solution that combines user-side performance measurements with network data extracted from the SDN controller.
{"title":"SDN-RADAR: Network troubleshooting combining user experience and SDN capabilities","authors":"Gabriela Gheorghe, T. Avanesov, M. Palattella, T. Engel, C. Popoviciu","doi":"10.1109/NETSOFT.2015.7116139","DOIUrl":"https://doi.org/10.1109/NETSOFT.2015.7116139","url":null,"abstract":"Software-defined deployments are growing into data center and enterprise network infrastructures. The typical promises of software-defined networks (SDN) are improved time for market, decreased risk and operational costs for services, flexibility and unified management. However, little is known and shared about how to actually manage an SDN network, especially in localising underperforming network paths (what we call “troubleshooting”). We describe a novel approach to ease large network troubleshooting by leveraging SDN features and incorporating distributed monitoring of network traffic. We suggest SDN-RADAR, a tool that can help network administrators understand which is the most likely faulty network link. To the best of our knowledge this is the first troubleshooting solution that combines user-side performance measurements with network data extracted from the SDN controller.","PeriodicalId":426452,"journal":{"name":"Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122090103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}