R. D. Corin, E. Salvadori, Pedro A. Aranda-Gutiérrez, Christian Stritzke, Alec Leckey, Kevin Phemius, Elisa Rojas, Carmen Guerrero
{"title":"NetIDE: Removing vendor lock-in in SDN","authors":"R. D. Corin, E. Salvadori, Pedro A. Aranda-Gutiérrez, Christian Stritzke, Alec Leckey, Kevin Phemius, Elisa Rojas, Carmen Guerrero","doi":"10.1109/NETSOFT.2015.7116170","DOIUrl":"https://doi.org/10.1109/NETSOFT.2015.7116170","url":null,"abstract":"The Software-Defined Networking (SDN) paradigm allows networking hardware to be made “malleable” and remotely manageable by the so-called SDN controllers. However, the current SDN landscape is extremely fragmented. Different open and closed source controller frameworks such as Open-Daylight [1], Ryu [2], Floodlight [3], etc. exist. Porting SDN applications from one such platform to another is practically impossible and so, SDN users like network operators face a situation where they are either confined to applications working for the platform of their choice, or forced to re-implement their solutions every time they encounter a new platform.","PeriodicalId":426452,"journal":{"name":"Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft)","volume":"1081 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127429022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Policy-based orchestration of NFV services in Software-Defined Networks","authors":"Kostas Giotis, Yiannos Kryftis, B. Maglaris","doi":"10.1109/NETSOFT.2015.7116145","DOIUrl":"https://doi.org/10.1109/NETSOFT.2015.7116145","url":null,"abstract":"In this paper we investigate synergies between Network Functions Virtualization (NFV) architectures and Software-Defined Networks (SDN). We identify value adding capabilities such technologies may offer to telecom providers regarding agile management and deployment of network functions across their infrastructures. Specifically, we propose a modular NFV architecture that permits policy-based management of Virtualized Network Functions (VNFs). Hence we can handle the lifecycle of VNFs and dynamically instantiate business applications as Service Chains of diverse VNFs delivered to large scale customers. To describe network resources, network control functions and VNFs capabilities we introduced an Information Model that abstracts these elements. In order to verify the proposed architecture we considered the case of multiple Content Delivery Network (CDN) providers having CDN caching nodes hosted by another operator. We implemented and deployed VNFs capable to map virtual links on the physical substrate and monitor the traffic of each client, ultimately providing the means to instantiate and orchestrate a policy-based traffic engineering service as a business application.","PeriodicalId":426452,"journal":{"name":"Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116228930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Basile, A. Lioy, Christian Pitscheider, Fulvio Valenza, Marco Vallini
{"title":"A novel approach for integrating security policy enforcement with dynamic network virtualization","authors":"C. Basile, A. Lioy, Christian Pitscheider, Fulvio Valenza, Marco Vallini","doi":"10.1109/NETSOFT.2015.7116152","DOIUrl":"https://doi.org/10.1109/NETSOFT.2015.7116152","url":null,"abstract":"Network function virtualization (NFV) is a new networking paradigm that virtualizes single network functions. NFV introduces several advantages compared to classical approaches, such as the dynamic provisioning of functionality or the implementation of scalable and reliable services (e.g., adding a new instance to support demands). NFV also allows the deployment of security controls, like firewalls or VPN gateways, as virtualized network functions. However, currently there is not an automatic way to select the security functions to enable and to configure the selected ones according to a set of user's security requirements. This paper presents a first approach towards the integration of network and security policy management into the NFV framework. By adding to the NFV architecture a new software component, the Policy Manager, we provide NFV with an easy and effective way for users to specify their security requirements and a process that hides all the details of the correct deployment and configuration of security functions. To perform its tasks, the Policy Manager uses policy refinement techniques.","PeriodicalId":426452,"journal":{"name":"Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122602925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"NDNFlow: Software-defined Named Data Networking","authors":"Niels L. M. van Adrichem, F. Kuipers","doi":"10.1109/NETSOFT.2015.7116131","DOIUrl":"https://doi.org/10.1109/NETSOFT.2015.7116131","url":null,"abstract":"In this paper, we introduce NDNFlow: an open-source software implementation of a Named Data Networking based forwarding scheme in OpenFlow-controlled Software-Defined Networks (SDNs). By setting up an application-specific communication channel and controller layer parallel to the application agnostic OpenFlow protocol, we obtain a mechanism to deploy specific optimizations into a network without requiring a full network upgrade or OpenFlow protocol change. Our open-source software implementation consists of both an NDN-specific controller module and an NDN client plug-in. NDNFlow allows OpenFlow networks with NDN capabilities to exploit the benefits of NDN, by enabling the use of intermediate caches, identifying flows of content and eventually performing traffic engineering based on these principles.","PeriodicalId":426452,"journal":{"name":"Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131331209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Martinez-Julia, Ved P. Kafle, A. Gómez-Skarmeta
{"title":"Integrating an identity-based control plane with the HIMALIS network architecture","authors":"P. Martinez-Julia, Ved P. Kafle, A. Gómez-Skarmeta","doi":"10.1109/NETSOFT.2015.7116134","DOIUrl":"https://doi.org/10.1109/NETSOFT.2015.7116134","url":null,"abstract":"The raise of Software Defined Networking (SDN) opens a wide spectrum of improvements for network architectures targeting different problems. It includes the case of those architectures designed to overcome mobility and multi-homing problems in big networks, such as the Internet, as is the case of the HIMALIS network architecture. In this paper we present an approach for HIMALIS to benefit from SDN technologies by changing the way it addresses its control operations. We propose to leverage control operations of the HIMALIS architecture through an identity-based control plane that has been designed following the principles of SDN. Thus, our approach proposes to integrate the main elements of HIMALIS with a controller, which provides enormous benefits to the architecture in general, such as the possibility to perform control operations with global knowledge of the network status and the evolution of the functions provided by the control plane without changing the implementation of the end nodes. Finally, in order to demonstrate those benefits, we have built architectonic models for both HIMALIS and our proposal, executed different simulations with them running on different mobility scenarios, and extracted the results that show clear improvement of our proposal.","PeriodicalId":426452,"journal":{"name":"Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115043403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Roberto Bonafiglia, Francesco Ciaccia, A. Lioy, M. Nemirovsky, Fulvio Risso, Tao Su
{"title":"Offloading personal security applications to a secure and trusted network node","authors":"Roberto Bonafiglia, Francesco Ciaccia, A. Lioy, M. Nemirovsky, Fulvio Risso, Tao Su","doi":"10.1109/NETSOFT.2015.7116171","DOIUrl":"https://doi.org/10.1109/NETSOFT.2015.7116171","url":null,"abstract":"The current device-centric protection model against security threats has serious limitations from the final user perspective, among the other the necessity to keep each device updated with the latest security updates and the necessity to replicate all the security polices across all devices. In our model, the protection is decoupled from the users terminals and it is provided through a Trusted Virtual Domain (TVD) instantiated in future edge routers. Each TVD provides unified and homogeneous security for a single user, irrespective of the terminal employed. This paper shows a first prototype implementing this concept through a network element, called Network Edge Device, capable of running the proposed virtualized architecture and making extensive use of SDN technologies, with the aim at providing a uniform security level for the final user.","PeriodicalId":426452,"journal":{"name":"Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft)","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115060445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QoS enabled WiFi MAC layer processing as an example of a NFV service","authors":"Jonathan Vestin, A. Kassler","doi":"10.1109/NETSOFT.2015.7116164","DOIUrl":"https://doi.org/10.1109/NETSOFT.2015.7116164","url":null,"abstract":"The Configuration and Management of large WLAN deployments is a challenge and available tools to ease such deployments and introduce new services are either commercial or very inflexible. In this paper, we present a different approach to such challenges called QoS enabled CloudMAC, which is to the best of our knowledge the first step towards QoS enabled WiFi MAC layer processing as an example of Network Function Virtualization. By moving the MAC layer processing to the cloud and integrating our architecture with QoS aware OpenFlow deployment, a software defined networking approach, we achieve a new level of flexibility, control and reconfigurability. CloudMAC Access Points (AP) just forward MAC layer frames towards a set of VMs (Virtual Access Points - VAP) that are responsible for processing MAC layer data and management frames (such as beacons, probe requests, etc). We have extended the SDN that connects the VAPs with the physical APs to support different packet prioritisation strategies such as HTB, SFQ, or FQ_CoDel. Our SDN controller is based on OpenDaylight which creates layer 2 forwarding rules that effectively prioritise CloudMAC traffic over legacy traffic. Our evaluation in a real testbed shows that packet prioritization strategies, especially FQ_CoDel, lead to good throughput and low latency for CloudMAC traffic while at the same time maintaining low latency for background traffic.","PeriodicalId":426452,"journal":{"name":"Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126618626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ahmed Medhat, G. Carella, Joyce B. Mwangama, N. Ventura
{"title":"Multi-tenancy for Virtualized Network Functions","authors":"Ahmed Medhat, G. Carella, Joyce B. Mwangama, N. Ventura","doi":"10.1109/NETSOFT.2015.7116177","DOIUrl":"https://doi.org/10.1109/NETSOFT.2015.7116177","url":null,"abstract":"The proliferation of cloud computing techniques has created a multitude of applications for network services deployments, enabled by the adoption of Software Defined Networks (SDN) and Network Functions Virtualization (NFV) paradigms. Mobile Network Operators (MNOs) also have the opportunity to leverage these technologies to enable the delivery of traditional networking functionality making use of cloud technologies. The benefit is cost reduction in the CAPEX and OPEX of the network infrastructure. Furthermore, multiple MNOs could share Virtualized Network Functions (VNFs) while maintaining separate logical data and control planes. This work investigates how those VNFs, in particular the Evolved Packet Core (EPC) Network Service (NS), can be shared using Virtual Tenant Networks (VTN) techniques. VTN provides a logical separation between data and control plane in virtualized networks. The design, implementation, and preliminary evaluations of such deployments are showcased in this paper, using open-source tools and readily available research playgrounds.","PeriodicalId":426452,"journal":{"name":"Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131938344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M.P.V. Manthena, Niels L. M. van Adrichem, C. V. D. Broek, F. Kuipers
{"title":"An SDN-based architecture for Network-as-a-Service","authors":"M.P.V. Manthena, Niels L. M. van Adrichem, C. V. D. Broek, F. Kuipers","doi":"10.1109/NETSOFT.2015.7116124","DOIUrl":"https://doi.org/10.1109/NETSOFT.2015.7116124","url":null,"abstract":"Network-as-a-Service (NaaS) is a cloud-based service model that offers on-demand network connectivity and the provisioning and management of network services. However, the actual orchestration of dynamically allocating underlying resources to customer requirements is not trivial. In this paper, we propose an SDN-based approach to support the NaaS model. We implement a proof-of-concept (PoC) on a physical testbed and validate it through experimental performance evaluation.","PeriodicalId":426452,"journal":{"name":"Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft)","volume":"273 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121411535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Lombardo, A. Manzalini, G. Schembra, G. Faraci, C. Rametta, Vincenzo Riccobene
{"title":"An open framework to enable NetFATE (Network Functions at the edge)","authors":"A. Lombardo, A. Manzalini, G. Schembra, G. Faraci, C. Rametta, Vincenzo Riccobene","doi":"10.1109/NETSOFT.2015.7116179","DOIUrl":"https://doi.org/10.1109/NETSOFT.2015.7116179","url":null,"abstract":"In the last few years, Software Defined Networks (SDN) and Network Functions Virtualization (NFV) have been introduced in the Internet as a new way to design, deploy and manage networking services. Working together, they are able to consolidate and deliver the networking components using standard IT virtualization technologies not only on high-volume servers, but even in the end user premises. In this context, this paper presents the NetFATE architecture, a platform aimed at putting virtual network functions (VNF) at the edge of the network. This platform is based on free and open source software on Provider Equipment (PE) and Customer Premise Equipment (CPE) nodes, so allowing function deployment simplification and management cost reduction. Finally, the paper proposes a case study, consisting in the implementation of two virtual personal firewalls used by two clients moving between two access points located at the edge of the core network.","PeriodicalId":426452,"journal":{"name":"Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126957362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}