20,423 research outputs found
A Framework and Comparative Analysis of Control Plane Security of SDN and Conventional Networks
Software defined networking implements the network control plane in an
external entity, rather than in each individual device as in conventional
networks. This architectural difference implies a different design for control
functions necessary for essential network properties, e.g., loop prevention and
link redundancy. We explore how such differences redefine the security
weaknesses in the SDN control plane and provide a framework for comparative
analysis which focuses on essential network properties required by typical
production networks. This enables analysis of how these properties are
delivered by the control planes of SDN and conventional networks, and to
compare security risks and mitigations. Despite the architectural difference,
we find similar, but not identical, exposures in control plane security if both
network paradigms provide the same network properties and are analyzed under
the same threat model. However, defenses vary; SDN cannot depend on edge based
filtering to protect its control plane, while this is arguably the primary
defense in conventional networks. Our concrete security analysis suggests that
a distributed SDN architecture that supports fault tolerance and consistency
checks is important for SDN control plane security. Our analysis methodology
may be of independent interest for future security analysis of SDN and
conventional networks
Ultra-Low Latency (ULL) Networks: The IEEE TSN and IETF DetNet Standards and Related 5G ULL Research
Many network applications, e.g., industrial control, demand Ultra-Low Latency
(ULL). However, traditional packet networks can only reduce the end-to-end
latencies to the order of tens of milliseconds. The IEEE 802.1 Time Sensitive
Networking (TSN) standard and related research studies have sought to provide
link layer support for ULL networking, while the emerging IETF Deterministic
Networking (DetNet) standards seek to provide the complementary network layer
ULL support. This article provides an up-to-date comprehensive survey of the
IEEE TSN and IETF DetNet standards and the related research studies. The survey
of these standards and research studies is organized according to the main
categories of flow concept, flow synchronization, flow management, flow
control, and flow integrity. ULL networking mechanisms play a critical role in
the emerging fifth generation (5G) network access chain from wireless devices
via access, backhaul, and core networks. We survey the studies that
specifically target the support of ULL in 5G networks, with the main categories
of fronthaul, backhaul, and network management. Throughout, we identify the
pitfalls and limitations of the existing standards and research studies. This
survey can thus serve as a basis for the development of standards enhancements
and future ULL research studies that address the identified pitfalls and
limitations
CARE: Content Aware Redundancy Elimination for Disaster Communications on Damaged Networks
During a disaster scenario, situational awareness information, such as
location, physical status and images of the surrounding area, is essential for
minimizing loss of life, injury, and property damage. Today's handhelds make it
easy for people to gather data from within the disaster area in many formats,
including text, images and video. Studies show that the extreme anxiety induced
by disasters causes humans to create a substantial amount of repetitive and
redundant content. Transporting this content outside the disaster zone can be
problematic when the network infrastructure is disrupted by the disaster.
This paper presents the design of a novel architecture called CARE
(Content-Aware Redundancy Elimination) for better utilizing network resources
in disaster-affected regions. Motivated by measurement-driven insights on
redundancy patterns found in real-world disaster area photos, we demonstrate
that CARE can detect the semantic similarity between photos in the networking
layer, thus reducing redundant transfers and improving buffer utilization.
Using DTN simulations, we explore the boundaries of the usefulness of deploying
CARE on a damaged network, and show that CARE can reduce packet delivery times
and drops, and enables 20-40% more unique information to reach the rescue teams
outside the disaster area than when CARE is not deployed
Network Coding as a Service
Network Coding (NC) shows great potential in various communication scenarios
through changing the packet forwarding principles of current networks. It can
improve not only throughput, latency, reliability and security but also
alleviates the need of coordination in many cases. However, it is still
controversial due to widespread misunderstandings on how to exploit the
advantages of it. The aim of the paper is to facilitate the usage of NC by
explaining how it can improve the performance of the network (regardless
the existence of any butterfly in the network), showing how Software
Defined Networking (SDN) can resolve the crucial problems of deployment and
orchestration of NC elements, and providing a prototype architecture
with measurement results on the performance of our network coding capable
software router implementation compared by fountain codes
Design of Virtualized Network Coding Functionality for Reliability Control of Communication Services over Satellite
Network coding (NC) is a novel coding technology that can be seen as a
generalization of classic point-to-point coding. As with classic coding, both
information theoretical and algebraic views bring different and complementary
insights of NC benefits and corresponding tradeoffs. However, the multi-user
nature of NC and its inherent applicability across all layers of the protocol
stack, call for novel design approaches towards efficient practical
implementation of this technology.
In this paper, we present a possible way forward to the design of NC as a
virtual network functionality offered to the communication service designer.
Specifically, we propose the integration of NC and Network Function
Virtualization (NFV) architectural designs. The integration is realized as a
toolbox of NC design domains that the service designer can use for flow
engineering. Our proposed design framework combines network protocol-driven
design and system modular-driven design approaches. In particular, the adaptive
choice of the network codes and its use for a specific service can then be
tailored and optimized depending on the ultimate service intent and underlying
(virtualized) system or network.
We work out a complete use case where we design geo-network coding, an
application of NC for which coding rate is optimized using databases of
geo-location information towards an energy-efficient use of resources. Our
numerical results highlight the benefits of both the proposed NC design
framework and the specific application
A Survey on Mobile Edge Networks: Convergence of Computing, Caching and Communications
As the explosive growth of smart devices and the advent of many new
applications, traffic volume has been growing exponentially. The traditional
centralized network architecture cannot accommodate such user demands due to
heavy burden on the backhaul links and long latency. Therefore, new
architectures which bring network functions and contents to the network edge
are proposed, i.e., mobile edge computing and caching. Mobile edge networks
provide cloud computing and caching capabilities at the edge of cellular
networks. In this survey, we make an exhaustive review on the state-of-the-art
research efforts on mobile edge networks. We first give an overview of mobile
edge networks including definition, architecture and advantages. Next, a
comprehensive survey of issues on computing, caching and communication
techniques at the network edge is presented respectively. The applications and
use cases of mobile edge networks are discussed. Subsequently, the key enablers
of mobile edge networks such as cloud technology, SDN/NFV and smart devices are
discussed. Finally, open research challenges and future directions are
presented as well
Elmo: Source-Routed Multicast for Cloud Services
We present Elmo, a system that addresses the multicast scalability problem in
multi-tenant data centers. Modern cloud applications frequently exhibit
one-to-many communication patterns and, at the same time, require
sub-millisecond latencies and high throughput. IP multicast can achieve these
requirements but has control- and data-plane scalability limitations that make
it challenging to offer it as a service for hundreds of thousands of tenants,
typical of cloud environments. Tenants, therefore, must rely on unicast-based
approaches (e.g., application-layer or overlay-based) to support multicast in
their applications, imposing overhead on throughput and end host CPU
utilization, with higher and unpredictable latencies.
Elmo scales network multicast by taking advantage of emerging programmable
switches and the unique characteristics of data-center networks; specifically,
the symmetric topology and short paths in a data center. Elmo encodes multicast
group information inside packets themselves, reducing the need to store the
same information in network switches. In a three-tier data-center topology with
27K hosts, Elmo supports a million multicast groups using a 325-byte packet
header, requiring as few as 1.1K multicast group-table entries on average in
leaf switches, with a traffic overhead as low as 5% over ideal multicast.Comment: 16 page
Network Coding for Critical Infrastructure Networks
The applications in the critical infrastructure systems pose simultaneous
resilience and performance requirements to the underlying computer network. To
meet such requirements, the networks that use the store-and-forward paradigm
poses stringent conditions on the redundancy in the network topology and
results in problems that becoming computationally challenging to solve at
scale. However, with the advent of programmable data-planes, it is now possible
to use linear network coding (NC) at the intermediate network nodes (i.e.
hardware and software switches) to meet resilience requirements of the
applications. To that end, we propose an architecture that realizes linear NC
in programmable networks by decomposing the linear NC functions into the atomic
coding primitives. We designed and implemented the primitives using the
features offered by the P4 ecosystem. Using an empirical evaluation of an
open-source prototype, we show that the theoretical gains promised by linear
network coding can be realized with a per-packet processing cost
A Comparative Survey of LPWA Networking
Motivated by the increasing variance of suggested Internet of Things (IoT)
applications and the lack of suitability of current wireless technologies in
scalable, long range deployments, a number of diverging Low Power Wide Area
(LPWA) technologies have been developed. These technologies promise to enable a
scalable high range network on cheap low power devices, facilitating the
development of a ubiquitous IoT. This paper provides a definition of this new
LPWA paradigm, presents a systematic approach to defined suitable use cases,
and undertakes a detailed comparison of current LPWA standards, including the
primary technologies, upcoming cellular options, and remaining proprietary
solutions.Comment: 10 page
Towards adaptive state consistency in distributed SDN control plane
State synchronisation in clustered Software Defined Networking controller
deployments ensures that all instances of the controller have the same state
information in order to provide redundancy. Current implementations of
controllers use a strong consistency model, where configuration changes must be
synchronised across a number of instances before they are applied on the
network infrastructure. For large deployments, this blocking process increases
the delay of state synchronisation across cluster members and consequently has
a detrimental effect on network operations that require rapid response, such as
fast failover and Quality of Service applications. In this paper, we introduce
an adaptive consistency model for SDN Controllers that employs concepts of
eventual consistency models along with a novel `cost-based' approach where
strict synchronisation is employed for critical operations that affect a large
portion of the network resources while less critical changes are periodically
propagated across cluster nodes. We use simulation to evaluate our model and
demonstrate the potential gains in performance.Comment: 7 page
- …