254 research outputs found

    SDN-based control and orchestration of optical data centre networks

    Get PDF
    The use of the Internet is linked with the constant technological change that the world is suffering nowadays, which is responsible for the important need to update the infrastructure of current data centers. The amount of traffic that is moving in data centers has increased significantly in the past few years, so a better alternative for them should be studied, as the use of Ethernet or InfiniBand is no longer appropriate in terms of scalability and flexibility. Optical technology is one possible solution for it, as it provides a big bandwidth, low latency and an overall better performance. However, the physical resources that form a data center should be managed in an efficient way. To perform an optimum use of them, the new concept of virtual data center appeared, where the orchestration of the resources is done with the aim of offering to a cloud infrastructure to a third party. In this context, OpenStack has become one of the most popular open source platforms when building public or private clouds, based on three important aspects: compute, storage and network. But the flexibility of these cloud infrastructures is attached to being scalable or dynamic. In this case, Software Definiton Network (SDN) and Network Function Virtualization (NFV) play an important role in data centers, as they allow to build complex network capabilities on demand. In this project, we experimentally demonstrate the programmable OPsquare data center network empowered by an SDN control plane. The implementation is based on monitoring the real-time statistics of the network, so some actions such as network slices provisioning and reconfiguration, packet priority class assignment or dynamic load balancing operations can be done in order to achieve the required Quality of Service level. This project is a cooperation between TU/e (Eindhoven University of Technology, The Netherlands) and UPC (Universitat Politècnica de Catalunya, Barcelona)

    Enabling virtual radio functions on software defined radio for future wireless networks

    Get PDF
    Today's wired networks have become highly flexible, thanks to the fact that an increasing number of functionalities are realized by software rather than dedicated hardware. This trend is still in its early stages for wireless networks, but it has the potential to improve the network's flexibility and resource utilization regarding both the abundant computational resources and the scarce radio spectrum resources. In this work we provide an overview of the enabling technologies for network reconfiguration, such as Network Function Virtualization, Software Defined Networking, and Software Defined Radio. We review frequently used terminology such as softwarization, virtualization, and orchestration, and how these concepts apply to wireless networks. We introduce the concept of Virtual Radio Function, and illustrate how softwarized/virtualized radio functions can be placed and initialized at runtime, allowing radio access technologies and spectrum allocation schemes to be formed dynamically. Finally we focus on embedded Software-Defined Radio as an end device, and illustrate how to realize the placement, initialization and configuration of virtual radio functions on such kind of devices

    Deploying SDN architecture in Open Optical Transport Networks

    Get PDF
    Pro udrženı́ tempa s rostoucı́mi požadavky na přenosovou rychlost, latenci a bezpečnost je nutné zvážit současnou koncepci řı́zenı́ sı́tı́. Software-Defined Networking (SDN) je jedno z možných řešenı́, ke kterému telekomunikačnı́ průmysl směruje. Tato práce představuje současný stav Software-Defined Networking a zaměřuje se na vybraná open-source řešenı́ v oblasti SDN kontrolerů, jako je ONOS či OpenDaylight. Hlavnı́m cı́lem této části práce je vysvětlit, jak může SDN pomoci vyřešit rostoucı́ požadavky na rozšı́řenı́ automatizace v otevřených optických sı́tı́ch. Praktická část této práce je rozdělená do dvou oblastı́. V rámci prvnı́ oblasti jsem se zabýval rozšı́řenı́m funkčnosti SDN kontroleru pro umožněnı́ konfigurace a řı́zenı́ optických komunikačnı́ch zařı́zenı́. Hlavnı́m přı́nosem je implementace nových funkcionalit SDN driveru pro Nokia 1830 PSS (ROADM) a rozšı́řenı́ funkcionality driveru pro Nokia 1830 PSI-2T (optický transpondér). Ve druhé části práce jsem se zabýval problematikou korelace alarmů v otevřených optických sı́tı́ch. Výsledkem je funkce pro korelaci alarmů ve formě SDN aplikace, kterou jsem dále otestoval na emulovaných optických zařı́zenı́ch pro prokázánı́ funkčnosti celého konceptu.With the rising demands on the network throughput, latency and security, legacy control networking concepts should be reconsidered. Software-Defined Networking (SDN) is one of the possible solutions, to which telecommunication industry is moving. This work presents current state-of-the-art in Software-Defined Networking and focuses on some open-source solutions of SDN controllers, like ONOS and OpenDaylight. Main focus is to understand how SDN can help to solve increasing demand for broader automation in Optical Transport Networks. The practical section is divided in two parts. Within the first part I focused on extending functionality of SDN controller to facilitate more efficient configuration and control of optical network devices. Main contribution was to implement additional features to SDN drivers for Nokia 1830 PSS (ROADM) and extend functionality of Nokia 1830 PSI-2T (Optical Transponder) driver. Second part is dedicated to the Alarm Correlation problematic in open optical networks. We designed, developed an Alarm Correlation function as a SDN application then we tested it on emulated optical devices to prove the concept

    Resource Allocation for Space Division Multiplexing:Optical White Box vs. Optical Black Box Networking

    Get PDF

    White Paper for Research Beyond 5G

    Get PDF
    The documents considers both research in the scope of evolutions of the 5G systems (for the period around 2025) and some alternative/longer term views (with later outcomes, or leading to substantial different design choices). This document reflects on four main system areas: fundamental theory and technology, radio and spectrum management; system design; and alternative concepts. The result of this exercise can be broken in two different strands: one focused in the evolution of technologies that are already ongoing development for 5G systems, but that will remain research areas in the future (with “more challenging” requirements and specifications); the other, highlighting technologies that are not really considered for deployment today, or that will be essential for addressing problems that are currently non-existing, but will become apparent when 5G systems begin their widespread deployment

    AUTOMATED NETWORK SECURITY WITH EXCEPTIONS USING SDN

    Get PDF
    Campus networks have recently experienced a proliferation of devices ranging from personal use devices (e.g. smartphones, laptops, tablets), to special-purpose network equipment (e.g. firewalls, network address translation boxes, network caches, load balancers, virtual private network servers, and authentication servers), as well as special-purpose systems (badge readers, IP phones, cameras, location trackers, etc.). To establish directives and regulations regarding the ways in which these heterogeneous systems are allowed to interact with each other and the network infrastructure, organizations typically appoint policy writing committees (PWCs) to create acceptable use policy (AUP) documents describing the rules and behavioral guidelines that all campus network interactions must abide by. While users are the audience for AUP documents produced by an organization\u27s PWC, network administrators are the responsible party enforcing the contents of such policies using low-level CLI instructions and configuration files that are typically difficult to understand and are almost impossible to show that they do, in fact, enforce the AUPs. In other words, mapping the contents of imprecise unstructured sentences into technical configurations is a challenging task that relies on the interpretation and expertise of the network operator carrying out the policy enforcement. Moreover, there are multiple places where policy enforcement can take place. For example, policies governing servers (e.g., web, mail, and file servers) are often encoded into the server\u27s configuration files. However, from a security perspective, conflating policy enforcement with server configuration is a dangerous practice because minor server misconfigurations could open up avenues for security exploits. On the other hand, policies that are enforced in the network tend to rarely change over time and are often based on one-size-fits-all policies that can severely limit the fast-paced dynamics of emerging research workflows found in campus networks. This dissertation addresses the above problems by leveraging recent advances in Software-Defined Networking (SDN) to support systems that enable novel in-network approaches developed to support an organization\u27s network security policies. Namely, we introduce PoLanCO, a human-readable yet technically-precise policy language that serves as a middle-ground between the imprecise statements found in AUPs and the technical low-level mechanisms used to implement them. Real-world examples show that PoLanCO is capable of implementing a wide range of policies found in campus networks. In addition, we also present the concept of Network Security Caps, an enforcement layer that separates server/device functionality from policy enforcement. A Network Security Cap intercepts packets coming from, and going to, servers and ensures policy compliance before allowing network devices to process packets using the traditional forwarding mechanisms. Lastly, we propose the on-demand security exceptions model to cope with the dynamics of emerging research workflows that are not suited for a one-size-fits-all security approach. In the proposed model, network users and providers establish trust relationships that can be used to temporarily bypass the policy compliance checks applied to general-purpose traffic -- typically by network appliances that perform Deep Packet Inspection, thereby creating network bottlenecks. We describe the components of a prototype exception system as well as experiments showing that through short-lived exceptions researchers can realize significant improvements for their special-purpose traffic
    corecore