{"title":"Proceedings of the third workshop on Hot topics in software defined networking","authors":"Aditya Akella, A. Greenberg","doi":"10.1145/2620728","DOIUrl":"https://doi.org/10.1145/2620728","url":null,"abstract":"We are delighted to welcome you to the third workshop on Hot Topics in Software Defined Networks (HotSDN'14). \u0000 \u0000Software Defined Networking (SDN) refactors the relationship between network devices and the software that controls them. Opening up the interfaces to programming the network enables more flexible and predictable network control, and makes it easier to extend the network with new functionality. SDN is being employed in a large and growing number of experimental and production settings spanning campus networks, telcos, clouds, and online service provider networks. A variety of new applications have been developed, including network virtualization, responsive traffic engineering, dynamic access control, seamless mobility support, etc. \u0000 \u0000The HotSDN workshop program covers many interesting issues in SDN, including new ideas for designing switch hardware and APIs that offer greater flexibility without compromising performance, new software platforms for better control and management of software defined networks, and novel SDN use cases. \u0000 \u0000This year's Call for Papers attracted 114 submissions, up from 84 submissions last year and 72 the year before. After reviewing the submissions, the Program Committee decided that there were simply too many high-quality papers, so we added lightning talks and a poster session to the program. In the end, we accepted 16 papers for full length talks, 17 papers for lightning presentations, and 17 poster papers. We believe the result is a fun and content-filled program that provides a snapshot of the state of the art in this new and exciting field.","PeriodicalId":309136,"journal":{"name":"Proceedings of the third workshop on Hot topics in software defined networking","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125589485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Thomas Knauth, Pradeep Kiruvale, M. Hiltunen, C. Fetzer
{"title":"Sloth: SDN-enabled activity-based virtual machine deployment","authors":"Thomas Knauth, Pradeep Kiruvale, M. Hiltunen, C. Fetzer","doi":"10.1145/2620728.2620765","DOIUrl":"https://doi.org/10.1145/2620728.2620765","url":null,"abstract":"While cloud computing is excellent at supporting elastic services that scale up to tens or hundreds of servers, its support for small-scale applications that only sporadically require one VM is lacking. To better support this sporadic usage model, we employ Software Defined Networking (SDN) technology to expose events related to network activity. Specifically, we rely on notifications when switch flow entries are removed or missing to determine resource (in)activity. Our prototype, Sloth, activates virtual machines based on incoming network traffic. Conversely, idle VMs are suspended to conserve resources. We present the design and architecture of our SDN-enabled on-demand resource deployment solution. Our empirical evaluation shows that VMs can be reactivated in less than one second, triggered by SDN events. This on-demand resource activation opens up novel applications for Cloud providers, allowing them to transparently deactivate idle VMs while maintaining connectivity at the same time.","PeriodicalId":309136,"journal":{"name":"Proceedings of the third workshop on Hot topics in software defined networking","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116593400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yifei Yuan, Franjo Ivancic, C. Lumezanu, Shuyuan Zhang, Aarti Gupta
{"title":"Generating consistent updates for software-defined network configurations","authors":"Yifei Yuan, Franjo Ivancic, C. Lumezanu, Shuyuan Zhang, Aarti Gupta","doi":"10.1145/2620728.2620774","DOIUrl":"https://doi.org/10.1145/2620728.2620774","url":null,"abstract":"This paper addresses the problem of consistently updating network configurations in a software-defined network. We are interested in generating an update sequence ordering that guarantees per-packet consistency. We present a procedure that computes a safe update sequence by generating an add-before rule dependency graph. Nodes in the graph correspond to rules to be installed and edges capture dependency relations among them.","PeriodicalId":309136,"journal":{"name":"Proceedings of the third workshop on Hot topics in software defined networking","volume":"38 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120996568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Jagadeesan, R. Pal, Kaushik Nadikuditi, Yan Huang, E. Shi, Minlan Yu
{"title":"A secure computation framework for SDNs","authors":"N. Jagadeesan, R. Pal, Kaushik Nadikuditi, Yan Huang, E. Shi, Minlan Yu","doi":"10.1145/2620728.2620768","DOIUrl":"https://doi.org/10.1145/2620728.2620768","url":null,"abstract":"Software Defined Networking (SDN) introduces a logically centralized control plane to run diverse management applications. In practice, a logically centralized control plane is realized using multiple controllers for scalability, reliability, and availability reasons. In fact, for various current and future networks of interest, it is practically infeasible to attempt a physically centralized SDN system. As SDN gains popularity, it is important to secure the SDN infrastructure to be resilient to potential attacks. In SDN, controllers can become high-value and attractive targets for an adversary for the following reasons. First, controllers are sinks of information collected from different switches. This includes network topology and flow-counter values. Such information can be privacy sensitive. For example, an organization may wish to protect its internal network topology or hide what type of traffic is being routed through its network. In addition, privacy policies may prohibit information from flowing between one part of the organizational network to another. Second, controllers run full-fledged software stacks including an operating system and management applications. Therefore, they may expose a much larger attack surface than switches. Moreover, threats may arise from multiple sources. In addition to software vulnerabilities that may exist in the controller software stack, malicious insiders who have privileged access to the controllers may leak sensitive information or sabotage network operations. For example, the network operator wants to make sure that traffic flow counters in the controllers stay untouched by an adversary. Manipulation of these counters could allow DDoS","PeriodicalId":309136,"journal":{"name":"Proceedings of the third workshop on Hot topics in software defined networking","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124090857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RadioVisor: a slicing plane for radio access networks","authors":"S. Katti, Erran L. Li","doi":"10.1145/2620728.2620782","DOIUrl":"https://doi.org/10.1145/2620728.2620782","url":null,"abstract":"To cope with the exponential traffic growth, increasingly diverse traffic mix including voice, video, machine-tomachine(M2M), and the spectrum shortage, wireless networks have to get densely deployed and dynamically adapt to meet the distinct requirements of diverse traffic classes. However, current network architectures are ill-equipped to support a dense and dynamic wireless infrastructure. First, since it will be impossible to obtain regularly placed cell sites for an infrastructure with higher density, basestations will be deployed wherever possible in a chaotic fashion. However, a chaotic and dense wireless deployment will be very complex to manage, since it will experience highly variable loads and unpredictable inter-cell interference among other things. Further since spectrum is limited, very likely all the basestations will be operating on the same frequency (referred to as frequency reuse factor of one). This leads to a tremendous amount of inter-cell interference, and that becomes the limiting factor for network capacity. Second, a dense infrastructure is very expensive to deploy and operate. Current deployments are unaffordable except to the largest operators, so a deployment with significantly higher density will likely be enormously expensive even for the largest operators, preventing smaller operators from expanding and offering consumers the choices they need. Rather than looking at the radio access layer as a collection of independent base stations, SoftRAN [1] proposes that all base stations deployed in a geographical area should be abstracted as a virtual big-base station which is made up of radio elements (the individual physical base stations). A logically centralized control plane makes all decisions regarding handovers and interference management, while the radio elements are simpler devices with minimal control logic. Since all neighboring base stations are allocating from a fixed set of shared resources, SoftRAN abstracts the radio resources as a 3D resource grid of space, time, and frequency slots; and program them in a software defined fashion through a logically centralized radio access control plane. Rather than having a single entity controlling radio access networks which limits sharing as standardized by 3GPP on LTE [2], we build on SoftRAN and argue that the 3D resource grid should be dynamically sliced based on traffic among virtual operators. This will enable virtual operators to innovate in scheduling, interference management and even in physical layer (PHY). Operators should be able to flexibly define slices based on subscriber attributes and application types (e.g. voice, video) to support a wide range of application requirements. Such architecture raises unique challenges compared to data-center and enterprise networks. Indeed, radio resources are inherently coupled due to the shared nature of wireless media. Unlike FlowVisor [3] which slices the flow space and easily isolates the disjoint subspaces. Slicing","PeriodicalId":309136,"journal":{"name":"Proceedings of the third workshop on Hot topics in software defined networking","volume":"380 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115910001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SoftMoW: a dynamic and scalable software defined architecture for cellular WANs","authors":"Mehrdad Moradi, Erran L. Li, Z. Morley Mao","doi":"10.1145/2620728.2620763","DOIUrl":"https://doi.org/10.1145/2620728.2620763","url":null,"abstract":"The current 4G LTE network architecture is organized into very large and rigid regions, each with an access edge consisting of only base stations and an Internet edge comprised of centralized packet gateways (PGWs) that enforce almost all network policies. In this architecture, there is minimal interaction among regions other than interference management at the edge, and all users’ outgoing traffic must traverse a PGW and possibly go through the Internet, even if the other endpoint is served by a close base station in the neighboring regions. The centralized policy enforcement, rigid organization of large regions, and a lack of inter-region interaction make the current cellular network architecture incredibly inflexible and inefficient. First, a recent study [1] shows that the lack of a sufficiently close PGW is a major cause of path inflation, suboptimal routing, and QoS degradation in large carriers. Second, there is no support or simple solutions for IP-based mobility between regions (“inter-PGWs”). Thus, users crossing regions experience service interruption [2]. Third, the sheer amount of traffic and centralized policy enforcement at PGWs, and the inability to directly route traffic between regions take a heavy toll on the scalability and reliability of PGWs and the cellular architecture as a whole. Fourth, with the exponential growth of mobile data and rapidly changing traffic patterns, the current architecture is ill-suited to adapt to the rise of new applications such as machine-to-machine (e.g., connected vehicles, telehealth) and bandwidth-intensive applications. Rather than organizing mobile wide area networks as rigid regions with no direct traffic transit, we argue that the cellular networks should have a fully connected core topology, small logical regions, and more egress points. In addition, operators should leverage software defined networking to manage the entire network with a logically-centralized controller. The controller directs traffic through efficient network paths that might cross region boundaries, supports and optimizes inter-region handoffs, and dynamically adapts to traffic patterns with efficient inter-region traffic engineering. Such an architecture raises unique scalability challenges in comparison with data-center and enterprise networks due to the geographically distributed nature of mobile WANs. Indeed, a logically-centralized controller in one pointof-presence with a flat architecture quickly becomes infeasible, if the mobile WAN spans a large region. This is due to the high latency between the controller and the data plane switches, the amount of signaling load from mobile users, and the very high number cellular handoffs.","PeriodicalId":309136,"journal":{"name":"Proceedings of the third workshop on Hot topics in software defined networking","volume":"1204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128645641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SDN traceroute: tracing SDN forwarding without changing network behavior","authors":"K. Agarwal, Eric Rozner, C. Dixon, J. Carter","doi":"10.1145/2620728.2620756","DOIUrl":"https://doi.org/10.1145/2620728.2620756","url":null,"abstract":"Software-defined networking provides flexibility in designing networks by allowing distributed network state to be managed by logically centralized control programs. However, this flexibility brings added complexity, which requires new debugging tools that can provide insights into network behavior. We propose a tool, SDN traceroute, that can query the current path taken by any packet through an SDN-enabled network. The path is traced by using the actual forwarding mechanisms at each SDN-enabled device without changing the forwarding rules being measured. This enables administrators to discover the forwarding behavior for arbitrary Ethernet packets, as well as debug problems in both switch and controller logic. Our prototype implementation requires only a few high-priority rules per device, runs on commodity hardware using only the required features of the OpenFlow 1.0 specification, and can generate traces in about one millisecond per hop.","PeriodicalId":309136,"journal":{"name":"Proceedings of the third workshop on Hot topics in software defined networking","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126304082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ranges and cross-entrance consistency with OpenFlow","authors":"Y. Afek, A. Bremler-Barr, Liron Schiff","doi":"10.1145/2620728.2620780","DOIUrl":"https://doi.org/10.1145/2620728.2620780","url":null,"abstract":"","PeriodicalId":309136,"journal":{"name":"Proceedings of the third workshop on Hot topics in software defined networking","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126365902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a scalable and near-sighted control plane architecture for WiFi SDNs","authors":"Julius Schulz-Zander, Nadi Sarrar, S. Schmid","doi":"10.1145/2620728.2620772","DOIUrl":"https://doi.org/10.1145/2620728.2620772","url":null,"abstract":"Not much is known today about how to reap the SDN benefits in WiFi networks-a critical use case given the increasing importance of WiFi networks. This paper presents AeroFlux, a scalable software-defined wireless network, that supports large enterprise and carrier WiFi deployments with low-latency programmatic control of fine-grained WiFi-specific transmission settings. This is achieved through AeroFlux's hierarchical design. We report on an early prototype implementation and evaluation, showing that AeroFlux can significantly reduce control plane traffic.","PeriodicalId":309136,"journal":{"name":"Proceedings of the third workshop on Hot topics in software defined networking","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126451347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. S. Seddiki, M. Shahbaz, S. Donovan, S. Grover, Miseon Park, N. Feamster, Yeqiong Song
{"title":"FlowQoS: QoS for the rest of us","authors":"M. S. Seddiki, M. Shahbaz, S. Donovan, S. Grover, Miseon Park, N. Feamster, Yeqiong Song","doi":"10.1145/2620728.2620766","DOIUrl":"https://doi.org/10.1145/2620728.2620766","url":null,"abstract":"We describe the architecture of FlowQoS, a system that makes it easier for users in home broadband access networks to configure quality of service based on applications and devices, as opposed to obscure, low-level parameters. The central tenet of FlowQoS's design is control logic that performs application identification and uses flow-table rules to forward traffic through the appropriate rate shapers on a home router. The architecture has two components: a flow classifier, which maps application traffic to the appropriate parts of flow space; and an SDN-based rate shaper, which shapes application traffic by forwarding it through the appropriate shaped virtual links in the home gateway. This paper describes the high-level architecture of FlowQoS, as well as our current implementation.","PeriodicalId":309136,"journal":{"name":"Proceedings of the third workshop on Hot topics in software defined networking","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115578024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}