Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft)最新文献

筛选
英文 中文
NetIDE: Removing vendor lock-in in SDN NetIDE:消除SDN中的供应商锁定
Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft) Pub Date : 2015-04-13 DOI: 10.1109/NETSOFT.2015.7116170
R. D. Corin, E. Salvadori, Pedro A. Aranda-Gutiérrez, Christian Stritzke, Alec Leckey, Kevin Phemius, Elisa Rojas, Carmen Guerrero
{"title":"NetIDE: Removing vendor lock-in in SDN","authors":"R. D. Corin, E. Salvadori, Pedro A. Aranda-Gutiérrez, Christian Stritzke, Alec Leckey, Kevin Phemius, Elisa Rojas, Carmen Guerrero","doi":"10.1109/NETSOFT.2015.7116170","DOIUrl":"https://doi.org/10.1109/NETSOFT.2015.7116170","url":null,"abstract":"The Software-Defined Networking (SDN) paradigm allows networking hardware to be made “malleable” and remotely manageable by the so-called SDN controllers. However, the current SDN landscape is extremely fragmented. Different open and closed source controller frameworks such as Open-Daylight [1], Ryu [2], Floodlight [3], etc. exist. Porting SDN applications from one such platform to another is practically impossible and so, SDN users like network operators face a situation where they are either confined to applications working for the platform of their choice, or forced to re-implement their solutions every time they encounter a new platform.","PeriodicalId":426452,"journal":{"name":"Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft)","volume":"1081 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127429022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Policy-based orchestration of NFV services in Software-Defined Networks 软件定义网络中基于策略的NFV业务编排
Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft) Pub Date : 2015-04-13 DOI: 10.1109/NETSOFT.2015.7116145
Kostas Giotis, Yiannos Kryftis, B. Maglaris
{"title":"Policy-based orchestration of NFV services in Software-Defined Networks","authors":"Kostas Giotis, Yiannos Kryftis, B. Maglaris","doi":"10.1109/NETSOFT.2015.7116145","DOIUrl":"https://doi.org/10.1109/NETSOFT.2015.7116145","url":null,"abstract":"In this paper we investigate synergies between Network Functions Virtualization (NFV) architectures and Software-Defined Networks (SDN). We identify value adding capabilities such technologies may offer to telecom providers regarding agile management and deployment of network functions across their infrastructures. Specifically, we propose a modular NFV architecture that permits policy-based management of Virtualized Network Functions (VNFs). Hence we can handle the lifecycle of VNFs and dynamically instantiate business applications as Service Chains of diverse VNFs delivered to large scale customers. To describe network resources, network control functions and VNFs capabilities we introduced an Information Model that abstracts these elements. In order to verify the proposed architecture we considered the case of multiple Content Delivery Network (CDN) providers having CDN caching nodes hosted by another operator. We implemented and deployed VNFs capable to map virtual links on the physical substrate and monitor the traffic of each client, ultimately providing the means to instantiate and orchestrate a policy-based traffic engineering service as a business application.","PeriodicalId":426452,"journal":{"name":"Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116228930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
A novel approach for integrating security policy enforcement with dynamic network virtualization 一种集成安全策略实施与动态网络虚拟化的新方法
Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft) Pub Date : 2015-04-13 DOI: 10.1109/NETSOFT.2015.7116152
C. Basile, A. Lioy, Christian Pitscheider, Fulvio Valenza, Marco Vallini
{"title":"A novel approach for integrating security policy enforcement with dynamic network virtualization","authors":"C. Basile, A. Lioy, Christian Pitscheider, Fulvio Valenza, Marco Vallini","doi":"10.1109/NETSOFT.2015.7116152","DOIUrl":"https://doi.org/10.1109/NETSOFT.2015.7116152","url":null,"abstract":"Network function virtualization (NFV) is a new networking paradigm that virtualizes single network functions. NFV introduces several advantages compared to classical approaches, such as the dynamic provisioning of functionality or the implementation of scalable and reliable services (e.g., adding a new instance to support demands). NFV also allows the deployment of security controls, like firewalls or VPN gateways, as virtualized network functions. However, currently there is not an automatic way to select the security functions to enable and to configure the selected ones according to a set of user's security requirements. This paper presents a first approach towards the integration of network and security policy management into the NFV framework. By adding to the NFV architecture a new software component, the Policy Manager, we provide NFV with an easy and effective way for users to specify their security requirements and a process that hides all the details of the correct deployment and configuration of security functions. To perform its tasks, the Policy Manager uses policy refinement techniques.","PeriodicalId":426452,"journal":{"name":"Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122602925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
NDNFlow: Software-defined Named Data Networking nndflow:软件定义的命名数据网络
Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft) Pub Date : 2015-04-13 DOI: 10.1109/NETSOFT.2015.7116131
Niels L. M. van Adrichem, F. Kuipers
{"title":"NDNFlow: Software-defined Named Data Networking","authors":"Niels L. M. van Adrichem, F. Kuipers","doi":"10.1109/NETSOFT.2015.7116131","DOIUrl":"https://doi.org/10.1109/NETSOFT.2015.7116131","url":null,"abstract":"In this paper, we introduce NDNFlow: an open-source software implementation of a Named Data Networking based forwarding scheme in OpenFlow-controlled Software-Defined Networks (SDNs). By setting up an application-specific communication channel and controller layer parallel to the application agnostic OpenFlow protocol, we obtain a mechanism to deploy specific optimizations into a network without requiring a full network upgrade or OpenFlow protocol change. Our open-source software implementation consists of both an NDN-specific controller module and an NDN client plug-in. NDNFlow allows OpenFlow networks with NDN capabilities to exploit the benefits of NDN, by enabling the use of intermediate caches, identifying flows of content and eventually performing traffic engineering based on these principles.","PeriodicalId":426452,"journal":{"name":"Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131331209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Integrating an identity-based control plane with the HIMALIS network architecture 将基于身份的控制平面与喜马拉雅网络架构集成
Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft) Pub Date : 2015-04-13 DOI: 10.1109/NETSOFT.2015.7116134
P. Martinez-Julia, Ved P. Kafle, A. Gómez-Skarmeta
{"title":"Integrating an identity-based control plane with the HIMALIS network architecture","authors":"P. Martinez-Julia, Ved P. Kafle, A. Gómez-Skarmeta","doi":"10.1109/NETSOFT.2015.7116134","DOIUrl":"https://doi.org/10.1109/NETSOFT.2015.7116134","url":null,"abstract":"The raise of Software Defined Networking (SDN) opens a wide spectrum of improvements for network architectures targeting different problems. It includes the case of those architectures designed to overcome mobility and multi-homing problems in big networks, such as the Internet, as is the case of the HIMALIS network architecture. In this paper we present an approach for HIMALIS to benefit from SDN technologies by changing the way it addresses its control operations. We propose to leverage control operations of the HIMALIS architecture through an identity-based control plane that has been designed following the principles of SDN. Thus, our approach proposes to integrate the main elements of HIMALIS with a controller, which provides enormous benefits to the architecture in general, such as the possibility to perform control operations with global knowledge of the network status and the evolution of the functions provided by the control plane without changing the implementation of the end nodes. Finally, in order to demonstrate those benefits, we have built architectonic models for both HIMALIS and our proposal, executed different simulations with them running on different mobility scenarios, and extracted the results that show clear improvement of our proposal.","PeriodicalId":426452,"journal":{"name":"Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115043403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Offloading personal security applications to a secure and trusted network node 将个人安全应用程序卸载到安全可信的网络节点
Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft) Pub Date : 2015-04-13 DOI: 10.1109/NETSOFT.2015.7116171
Roberto Bonafiglia, Francesco Ciaccia, A. Lioy, M. Nemirovsky, Fulvio Risso, Tao Su
{"title":"Offloading personal security applications to a secure and trusted network node","authors":"Roberto Bonafiglia, Francesco Ciaccia, A. Lioy, M. Nemirovsky, Fulvio Risso, Tao Su","doi":"10.1109/NETSOFT.2015.7116171","DOIUrl":"https://doi.org/10.1109/NETSOFT.2015.7116171","url":null,"abstract":"The current device-centric protection model against security threats has serious limitations from the final user perspective, among the other the necessity to keep each device updated with the latest security updates and the necessity to replicate all the security polices across all devices. In our model, the protection is decoupled from the users terminals and it is provided through a Trusted Virtual Domain (TVD) instantiated in future edge routers. Each TVD provides unified and homogeneous security for a single user, irrespective of the terminal employed. This paper shows a first prototype implementing this concept through a network element, called Network Edge Device, capable of running the proposed virtualized architecture and making extensive use of SDN technologies, with the aim at providing a uniform security level for the final user.","PeriodicalId":426452,"journal":{"name":"Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft)","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115060445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
QoS enabled WiFi MAC layer processing as an example of a NFV service QoS启用WiFi MAC层处理作为NFV服务的一个例子
Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft) Pub Date : 2015-04-13 DOI: 10.1109/NETSOFT.2015.7116164
Jonathan Vestin, A. Kassler
{"title":"QoS enabled WiFi MAC layer processing as an example of a NFV service","authors":"Jonathan Vestin, A. Kassler","doi":"10.1109/NETSOFT.2015.7116164","DOIUrl":"https://doi.org/10.1109/NETSOFT.2015.7116164","url":null,"abstract":"The Configuration and Management of large WLAN deployments is a challenge and available tools to ease such deployments and introduce new services are either commercial or very inflexible. In this paper, we present a different approach to such challenges called QoS enabled CloudMAC, which is to the best of our knowledge the first step towards QoS enabled WiFi MAC layer processing as an example of Network Function Virtualization. By moving the MAC layer processing to the cloud and integrating our architecture with QoS aware OpenFlow deployment, a software defined networking approach, we achieve a new level of flexibility, control and reconfigurability. CloudMAC Access Points (AP) just forward MAC layer frames towards a set of VMs (Virtual Access Points - VAP) that are responsible for processing MAC layer data and management frames (such as beacons, probe requests, etc). We have extended the SDN that connects the VAPs with the physical APs to support different packet prioritisation strategies such as HTB, SFQ, or FQ_CoDel. Our SDN controller is based on OpenDaylight which creates layer 2 forwarding rules that effectively prioritise CloudMAC traffic over legacy traffic. Our evaluation in a real testbed shows that packet prioritization strategies, especially FQ_CoDel, lead to good throughput and low latency for CloudMAC traffic while at the same time maintaining low latency for background traffic.","PeriodicalId":426452,"journal":{"name":"Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126618626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Multi-tenancy for Virtualized Network Functions 虚拟化网络功能的多租户
Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft) Pub Date : 2015-04-13 DOI: 10.1109/NETSOFT.2015.7116177
Ahmed Medhat, G. Carella, Joyce B. Mwangama, N. Ventura
{"title":"Multi-tenancy for Virtualized Network Functions","authors":"Ahmed Medhat, G. Carella, Joyce B. Mwangama, N. Ventura","doi":"10.1109/NETSOFT.2015.7116177","DOIUrl":"https://doi.org/10.1109/NETSOFT.2015.7116177","url":null,"abstract":"The proliferation of cloud computing techniques has created a multitude of applications for network services deployments, enabled by the adoption of Software Defined Networks (SDN) and Network Functions Virtualization (NFV) paradigms. Mobile Network Operators (MNOs) also have the opportunity to leverage these technologies to enable the delivery of traditional networking functionality making use of cloud technologies. The benefit is cost reduction in the CAPEX and OPEX of the network infrastructure. Furthermore, multiple MNOs could share Virtualized Network Functions (VNFs) while maintaining separate logical data and control planes. This work investigates how those VNFs, in particular the Evolved Packet Core (EPC) Network Service (NS), can be shared using Virtual Tenant Networks (VTN) techniques. VTN provides a logical separation between data and control plane in virtualized networks. The design, implementation, and preliminary evaluations of such deployments are showcased in this paper, using open-source tools and readily available research playgrounds.","PeriodicalId":426452,"journal":{"name":"Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131938344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
An SDN-based architecture for Network-as-a-Service 基于sdn的网络即服务体系结构
Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft) Pub Date : 2015-04-13 DOI: 10.1109/NETSOFT.2015.7116124
M.P.V. Manthena, Niels L. M. van Adrichem, C. V. D. Broek, F. Kuipers
{"title":"An SDN-based architecture for Network-as-a-Service","authors":"M.P.V. Manthena, Niels L. M. van Adrichem, C. V. D. Broek, F. Kuipers","doi":"10.1109/NETSOFT.2015.7116124","DOIUrl":"https://doi.org/10.1109/NETSOFT.2015.7116124","url":null,"abstract":"Network-as-a-Service (NaaS) is a cloud-based service model that offers on-demand network connectivity and the provisioning and management of network services. However, the actual orchestration of dynamically allocating underlying resources to customer requirements is not trivial. In this paper, we propose an SDN-based approach to support the NaaS model. We implement a proof-of-concept (PoC) on a physical testbed and validate it through experimental performance evaluation.","PeriodicalId":426452,"journal":{"name":"Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft)","volume":"273 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121411535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
An open framework to enable NetFATE (Network Functions at the edge) 启用NetFATE(网络边缘功能)的开放框架
Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft) Pub Date : 2015-04-13 DOI: 10.1109/NETSOFT.2015.7116179
A. Lombardo, A. Manzalini, G. Schembra, G. Faraci, C. Rametta, Vincenzo Riccobene
{"title":"An open framework to enable NetFATE (Network Functions at the edge)","authors":"A. Lombardo, A. Manzalini, G. Schembra, G. Faraci, C. Rametta, Vincenzo Riccobene","doi":"10.1109/NETSOFT.2015.7116179","DOIUrl":"https://doi.org/10.1109/NETSOFT.2015.7116179","url":null,"abstract":"In the last few years, Software Defined Networks (SDN) and Network Functions Virtualization (NFV) have been introduced in the Internet as a new way to design, deploy and manage networking services. Working together, they are able to consolidate and deliver the networking components using standard IT virtualization technologies not only on high-volume servers, but even in the end user premises. In this context, this paper presents the NetFATE architecture, a platform aimed at putting virtual network functions (VNF) at the edge of the network. This platform is based on free and open source software on Provider Equipment (PE) and Customer Premise Equipment (CPE) nodes, so allowing function deployment simplification and management cost reduction. Finally, the paper proposes a case study, consisting in the implementation of two virtual personal firewalls used by two clients moving between two access points located at the edge of the core network.","PeriodicalId":426452,"journal":{"name":"Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126957362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信