Decentralizing SDN s Control Plane
|
|
|
- Jonas Hood
- 10 years ago
- Views:
Transcription
1 Decentralizing SDN s Control Plane Mateus Augusto Silva Santos, Bruno Nunes Astuto, Katia Obraczka, Thierry Turletti, Bruno Trevizan De Oliveira, Cintia Borges Margi To cite this version: Mateus Augusto Silva Santos, Bruno Nunes Astuto, Katia Obraczka, Thierry Turletti, Bruno Trevizan De Oliveira, et al.. Decentralizing SDN s Control Plane. IEEE Local Computer Networks (LCN), Sep 2014, Edmonton, Canada <hal > HAL Id: hal Submitted on 7 Jul 2014 HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.
2 Decentralizing SDN s Control Plane Mateus A. S. Santos, Bruno A. A. Nunes, Katia Obraczka, Thierry Turletti, Bruno T. de Oliveira and Cintia B. Margi University of Sao Paulo, Brazil INRIA, France UC Santa Cruz, USA Abstract Motivated by the internets of the future, which will likely be considerably larger in size as well as highly heterogeneous and decentralized, we propose Decentralize-SDN, D-SDN, a framework that enables not only physical but also logical distribution of the Software-Defined Networking (SDN) control plane. D-SDN accomplishes network control distribution by defining a hierarchy of controllers that can match an internet s organizational and administrative structure. By delegating control between main controllers and secondary controllers, D-SDN is able to accommodate administrative decentralization and autonomy. It incorporates security as an integral part of the framework. This paper describes D-SDN and presents two use cases, namely network capacity sharing and public safety network services. I. INTRODUCTION The growing need to facilitate network evolution motivated the emergence of the Software-Defined Networking (SDN) paradigm. SDN s premise is to decouple the network controland data planes and thus make deploying new network services and protocols viable especially in production networked environments. However, SDN techniques to-date, including Open- Flow, have mostly targeted managed networks. As such, they promote logically centralized control which is ill-suited not only to the scale but also to the level of administrative decentralization and episodic connectivity that may be present in future internets. Fig. 1. SDN control distribution Most approaches aiming at increasing the scalability and robustness of the SDN control plane have also targeted managed networks, e.g. data centers and intranets, where it is reasonable to assume the existence of a single, logically centralized administrative authority, as shown in the left part of Figure 1. However, this assumption does not hold in heterogeneous internets that may include a variety of autonomously administered networks, such as infrastructureless self-organizing networks (as illustrated in Figure 1). We propose Decentralize-SDN, or D-SDN, an SDN framework that allows SDN control distribution both physi- Fig. 2. Control delegation from MC to SCs in a heterogeneous internet. cally and logically by defining a control hierarchy of main controllers (MCs) and secondary controllers(scs). In smart spaces type applications, for example, devices within the home are controlled by the home controller independent of the smart neighborhood controller and the ISP s controller. D-SDN enables logically decentralized control through control delegation between different levels of the control hierarchy, as shown in the right part of Figure 1. Another distinguishing feature of D-SDN is that it incorporates security as integral part of the framework and its underlying protocols. As proof of concept, we apply the D-SDN framework in two use cases, namely: (1) network capacity sharing, in which control decentralization enables nodes in a infrastructure-less network to connect to the Internet via other (connected) nodes, and (2) public safety network (PSN) scenario that showcases control decentralization in emergency response services. II. D-SDN OVERVIEW As mentioned previously, D-SDN defines two types of controllers: Main Controllers (MCs) and Secondary Controllers (SCs). The main difference between them is that SCs require that MCs authorize and delegate control to them before SCs are able to act as SDN controllers. In addition, we envision that SCs will typically be responsible for managing SDN switches in a sub-domain within the MC s domain. Let us take the scenario shown in Figure 2. Under centralized control, the MC controls the two ad-hoc networks (MANETs). SDN-capable mobile devices in the MANETs need to rely on the MCs forwarding decisions. Thus, every new flow in the MANET generates a request to the MC, which then needs to respond with the appropriate flow modification message(s). Alternatively, using D-SDN s decentralized control plane, GW 1 and GW 2 can act as SCs upon MC s authorization and delegation. As a result, new flows arriving at MANET nodes will not need to reach the MC and could be handled directly by the corresponding SC. Hierarchy of Controllers: In D-SDN, control distribution is based on a hierarchy of MCs and SCs which can also be used to improve control plane availability and fault tolerance.
3 Following the hierarchy, MCs can delegate control of certain devices to a particular SC. For example, an SC would not be allowed to write new flow entries to a device s flow table without a delegation from the corresponding MC. Note that SCs must have been previously authenticated by the MC or some other trusted third-party authority before being able to participate in the network control plane. Control Delegation: An MC can delegate the control to an SC with respect to a set of SDN-enabled devices. Delegation can be initiated by an MC or can occur upon a request from the SC. A delegation request can be triggered by different kinds of events. For example, when a new SC is deployed geographically closer to a set of devices, it could request delegation from the MC to control these devices. Another example is a scenario in which mobile devices in a MANET need connection to the Internet through a gateway node. The gateway can then request authorization from the MC for playing the role of an SC to new devices joining the network. MC-SC Communication: As previously pointed out, a network device is only able to act as an SC upon the authorization of the corresponding MC through a Control Delegation message. In addition, MC-SC communication usually happens within the same administrative domain. Control delegation is illustrated in Figure 3 and proceeds as follows: Check-in Request: an SC requests authorization for managing a specific SDN-enabled device. Check-in Response: the MC, upon accessing its database, authorizes or denies access by the requesting SC. Fig. 3. Delegation of control from main- to secondary controller. SC-SC Communication and Fault Tolerance: SCs use D- SDN s SC-SC protocol to implement fault tolerance in case of failure of the current SC. Inspired by OpenFlow (OF) 1.3 [7], we differentiate master controllers from slave controllers in order to provide fault tolerance. Slave controllers do not receive messages from a switch. However, they can become masters by sending a role request message to the corresponding switch. The current master controller sends periodic Hello messages as keep-alive signaling. Slave controllers detect that the master failed after not receiving Hello messages for a predefined period of time. When that happens, slaves will start an election process to select a master among them. If a new master is elected, it will inform the corresponding devices that will be under its control. These devices will then remove the old master from the master role. The master also sends Update messages to slave controllers to make sure that their state is in sync. Update messages contain the application modules currently running on the master as well as the list of switches it controls. III. IMPLEMENTATION In our testbed, mobile nodes are SDN-enabled through the use of software switches, e.g., Open-VSwitch (OVS). SDN-enabled nodes can thus be responsible for forwarding incoming traffic, maintaining flow tables, and communicating with the controller when needed. Our current implementation is comprised of a server-side and a client-side. The server-side exposes an interface to a hierarchy of controllers. The client-side provides accounting data to the servers as well as management of cryptographic material that is used for providing security services such as data confidentiality and authentication. Regarding security, we use Identity Based Cryptography (IBC) [9]. which requires a Trusted Third Party (TTP) responsible for secret key generation. There is synergy between controllers and TTPs. In particular, MCs can play the role of a TTP. Using the notation presented in Table I, we describe the main protocols D-SDN components use in order to communicate. ID X, ctr S X, P X K X,Y authenc(, k) enc(, k), dec(, k) mac, s identity of X and counter, respectively private and public key of X, respectively key established between nodes X and Y authenticated encryption using key k encryption/decryption using key k authentication tag and master secret key TABLE I NOTATION. Setup: As public keys are derived from identities, the TTP (i.e., the controller) maps the node identity, ID X, to a point in the elliptic curve, P X. This mapping is a public parameter, since a node is allowed to generate any device s public key. The TTP generates a master secret key s and calculates each node s private key as S X = sp X. This value should be either sent privately by the TTP or pre-deployed on the device (i.e., SC or end-host device). Authenticated Key Agreement: Pairings[8] provide practical implementation for authenticated key agreement (AKA) over IBC, which is an elegant alternative to non-authenticated schemes such as the Diffie-Hellman interactive key exchange.the AKA procedure considered here has the main goal of avoiding public key encryption. It means that, once a key is agreed between two nodes using public key cryptography, they can use the shared key for confidentiality and data authentication. Handshaking: In the handshaking procedure, a new coming device, or requesting node (RN), is required to respond to a challenge, so that the authenticator is able to verify the devices identity. This allows them to compute a shared key, which is used for authenticated encryption of the challenge. Figure 4 shows in detail this process. Availability: The proposed framework is available for download from A. Secure Capacity Sharing IV. EVALUATION For the secure capacity sharing use case, we assume the network model illustrated in Figure 2, where a node in a client
4 Fig. 4. Detailed handshaking procedure. Fig. 6. Throughput before and after handover. Fig. 5. High level description for node authorization through main controller. Fig. 7. Throughput before and after the event of activating a redundant gateway with no QoS enforcement policy. network, called here the Requesting Node (RN), wishes to connect to the Internet and accesses, for example, the World Wide Web. However, it is unable to connect to the existing network infrastructure (e.g., because the RN is out of range of the closest AP). Another node, called gateway node 1 - GW1, advertises its gateway services providing RN the option to connect to the Internet through it. Note that RN can connect to GW1 directly or through a wireless, multi-hop adhoc network (MANET) using some existing MANET routing protocol to route packets towards GW1. The main steps to achieve secure network capacity sharing using D-SDN (illustrated in Figure 5), are as follows: Gateway discovery: GW nodes send periodic messages, announcing their gateway capabilities. The potential users, on the recipient of such messages will choose a GW, by sending a Request message to the most suitable candidate; Handshaking: a GW node responds to a user request and initiates a handshaking procedure for node authentication; User check-in: the GW requests authorization to the main controller, which queries its database in order to approve allocation of resources to the designated customer. If a user is authorized, the main controller adds the new flow-table entries to the forwarding devices on user data path towards the Internet. The procedure of user check-in includes the delegation of control from the MC to the gateway with respect to user device administration. Secure Handover: Here, we adopt the scenario in which a user notices that a more suitable GW becomes available. The user itself can send a request to the new candidate and perform a handshaking procedure. Then, the MC can orchestrate flow creation and removal in the new and old gateways, respectively. In order to demonstrate the handover, we generated a sequence of HTTP requests to an external web server (located outside the local network) and measured the throughput. We collected 10 samples for each element of the sequence and report a 95% confidence level in our results. Figure 6 shows the results, in which effective handover points to the first HTTP request after the new gateway took over. It can be seen from the figure that the throughput fluctuates so that the handover cannot be observed among different HTTP requests. In this particular case, both gateways presented similar performance. We emphasize that our goal is not to increase performance among gateways, but to provide seamless handover. QoS and Gateway Redundancy: Quality of service can be enforced by MCs or SCs by using ingress policy rates. In the same scenario of Figure 2, a gateway would prevent RNs from allocating more than a determined fraction of the total bandwidth provided by the ISP. We carried out experiments using one single gateway with the ingress policy set to 3 kbps. Then, another gateway with no restrictions becomes available as a redundant channel to the infrastructured network. We measured the throughput during sequences of HTTP requests to a server. Figure 7 shows that network performance is limited to the configured throughput as long as the redundant GW is not activated.
5 Minimum Maximum Average (95% confidence interval) (3.7, 4.7) TABLE II TIME IN SECONDS TO RECOVER FROM A FAILURE (t out = 5 AND t h = 3). Fig. 8. Broadband scenario for inter-agency communication. Source: [1] GOAL: Evaluation of fault tolerance in a MANET, in which SC i is the active controller. SC j takes over after SC i failure. Fig. 9. 1) SCs exchange periodic Hello messages with their identities and roles for each SDN-enabled device, if any exists, under their scope; 2) SC i fails; 3) An election protocol is triggered among SCs due to a timeout for receiving Hello messages from the master controller; 4) The elected controller, say SC j, requests the administration of the corresponding SDN-enabled devices and effectively replaces the failed controller; 5) Role Reply messages from devices confirm that SC j took over. Scenario for fault tolerance among the SCs inside a MANET. B. Public Safety Networks PSNs are built to detect and/or handle disaster events [3]. Such networks are set to provide communication and coordination for emergency responders and operations. Many of the challenges in the PSN field come from the variety of systems and agencies involved in the crisis response and from their mobility at the disaster site [3]. By decentralizing the control plane, our proposed framework allows rapid deployment, reliability and interoperability. We envisage a scenario in which public safety authorities can organize themselves for exchanging valuable information regarding an emergency situation. We showcase our proposal over such a scenario, illustrated in Figure 8. In this figure vehicles are capable of serving as GWs to a network of different agency actors (e.g., firefighters and police officers). Our testbed instantiates SCs at the agencies vehicles. A single agency can have many decentralized SCs that exchange messages with other agencies SCs. They should rely on our framework in order to continue operating correctly in the event of link failures. Figure 9 describes the proposed scenario for implementing tolerance to failures. Methodology and Results: The experiments were carried out using four controllers and one switch. A single node was set as master for the switch. All the nodes, including the switch, were configured in a wireless ad hoc network. We integrated the Paxos election protocol proposed with our framework. Before presenting the results, we elaborate on the main parameters of the system. Let t h be the time between periodic Hello messages sent by the master controller. Let t out be the timeout, or in other words, the time a non-master controller waits for receiving the next Hello message. Given that 0 < t h t out, the worst case scenario for controllers to detect a failure is when the master actually fails just after sending a Hello message. In our experiments, we used t out = 5 seconds and t h = 3 seconds. We collected 20 samples and computed a 95% confidence interval. We used a random failure time at each sample. Table II shows the recovery time, which is not only the time to detect a failure, but also the time it takes for the new master to take control of the switch. The minimum time (i.e., 2.3 seconds) is close to the best case scenario mentioned earlier. V. RELATED WORK Previous work such as [5] propose a logically centralized but physically distributed control plane by means of a distributed file system. The trade-offs on distributing the control plane under a logically centralized scheme are investigated by Levin et al. [6]. An example of hierarchical control is Kandoo [2], which allows the deployment of local controllers with no network-wide state. Nevertheless, Kandoo still needs a logically centralized root controller. Phemius et al. proposed DISCO [4]. Even though DISCO is decentralized, it neither considers controller hierarchy nor deals with fault tolerance. VI. CONCLUSION We proposed Decentralize-SDN, a general framework enables a wide range of current- as well as future network services and applications through the decentralization of the SDN control plane. D-SDN supports control distribution by defining a hierarchy of controllers in which main controllers can delegate functions to secondary controllers. As future work, we envision new D-SDN based network services and applications, such as inter-domain routing and load balancing. ACKNOWLEDGMENTS This work is partly funded by the Community Associated Team between INRIA and UCSC, the French ANR under the ANR-13-INFR-013 project, the Sao Paulo Research Foundation (FAPESP) under grant 2013/ , the National Council for Scientific and Technological Development (CNPq) under grant /2012-4, and by NSF grant CNS REFERENCES [1] EADS Defence and Security Systems, CHORIST final report SP0.R7, 2009, available online at [2] S. Hassas Yeganeh and Y. Ganjali, Kandoo: A framework for efficient and scalable offloading of control applications, in Proceedings of the First Workshop on Hot Topics in Software Defined Networks, ser. HotSDN 12. New York, NY, USA: ACM, 2012, pp [3] Iapichino, Giuliana, D. Camara, C. Bonnet, and F. Filali, Public Safety Networks. IGI Global, [4] J. L. Kevin Phemius, Mathieu Bouet, DISCO: Distributed multi-domain sdn controllers, CoRR, vol. abs/ , [5] T. Koponen, M. Casado, N. Gude, J. Stribling, L. Poutievski, M. Zhu, R. Ramanathan, Y. Iwata, H. Inoue, T. Hama et al., Onix: A distributed control platform for large-scale production networks. in OSDI, vol. 10, 2010, pp [6] D. Levin, A. Wundsam, B. Heller, N. Handigol, and A. Feldmann, Logically centralized?: state distribution trade-offs in software defined networks, in Proceedings of the workshop on Hot topics in software defined networks. New York, USA: ACM, 2012, pp [7] Open Networking Foundation, Openflow switch specification 1.3, [8] R. Sakai, K. Ohgishi, and M. Kasahara, Cryptosystems based on pairing, in SCIS00, 2000, pp [9] A. Shamir, Identity-based cryptosystems and signature schemes, in CRYPTO, ser. LNCS, G. Blakley and D. Chaum, Eds. Springer Berlin Heidelberg, 1985, vol. 196, pp
A Decentralized SDN Framework and Its Applications to Heterogeneous Internets
A Decentralized SDN Framework and Its Applications to Heterogeneous Internets Mateus Santos, Bruno Nunes Astuto, Bruno De Oliveira, Cintia Margi, Katia Obraczka, Thierry Turletti To cite this version:
Mobility management and vertical handover decision making in heterogeneous wireless networks
Mobility management and vertical handover decision making in heterogeneous wireless networks Mariem Zekri To cite this version: Mariem Zekri. Mobility management and vertical handover decision making in
Scalability of Control Planes for Software Defined Networks:Modeling and Evaluation
of Control Planes for Software Defined Networks:Modeling and Evaluation Jie Hu, Chuang Lin, Xiangyang Li, Jiwei Huang Department of Computer Science and Technology, Tsinghua University Department of Computer
SDN Security Design Challenges
Nicolae Paladi SDN Security Design Challenges SICS Swedish ICT! Lund University In Multi-Tenant Virtualized Networks Multi-tenancy Multiple tenants share a common physical infrastructure. Multi-tenancy
Flauncher and DVMS Deploying and Scheduling Thousands of Virtual Machines on Hundreds of Nodes Distributed Geographically
Flauncher and Deploying and Scheduling Thousands of Virtual Machines on Hundreds of Nodes Distributed Geographically Daniel Balouek, Adrien Lèbre, Flavien Quesnel To cite this version: Daniel Balouek,
ibalance-abf: a Smartphone-Based Audio-Biofeedback Balance System
ibalance-abf: a Smartphone-Based Audio-Biofeedback Balance System Céline Franco, Anthony Fleury, Pierre-Yves Guméry, Bruno Diot, Jacques Demongeot, Nicolas Vuillerme To cite this version: Céline Franco,
Distributed Software-Defined Networking: The ACM PODC 2014 Workshop DSDN
Distributed Software-Defined Networking: The ACM PODC 2014 Workshop DSDN Petr Kuznetsov 1 Stefan Schmid 2 1 Télécom ParisTech [email protected] 2 TU Berlin & T-Labs [email protected]
Managing Risks at Runtime in VoIP Networks and Services
Managing Risks at Runtime in VoIP Networks and Services Oussema Dabbebi, Remi Badonnel, Olivier Festor To cite this version: Oussema Dabbebi, Remi Badonnel, Olivier Festor. Managing Risks at Runtime in
Enabling Software Defined Networking using OpenFlow
Enabling Software Defined Networking using OpenFlow 1 Karamjeet Kaur, 2 Sukhveer Kaur, 3 Vipin Gupta 1,2 SBS State Technical Campus Ferozepur, 3 U-Net Solutions Moga Abstract Software Defined Networking
Failover Mechanisms for Distributed SDN Controllers
Failover Mechanisms for Distributed SDN Controllers Mathis Obadia, Mathieu Bouet, Jérémie Leguay, Kévin Phemius, Luigi Iannone Thales Communications & Security {firstname.name}@thalesgroup.com Telecom
Global Identity Management of Virtual Machines Based on Remote Secure Elements
Global Identity Management of Virtual Machines Based on Remote Secure Elements Hassane Aissaoui, P. Urien, Guy Pujolle To cite this version: Hassane Aissaoui, P. Urien, Guy Pujolle. Global Identity Management
Orion: A Hybrid Hierarchical Control Plane of Software-Defined Networking for Large-Scale Networks
2014 IEEE 22nd International Conference on Network Protocols Orion: A Hybrid Hierarchical Control Plane of Software-Defined Networking for Large-Scale Networks Yonghong Fu 1,2,3, Jun Bi 1,2,3, Kai Gao
Improving Network Management with Software Defined Networking
Improving Network Management with Software Defined Networking Hyojoon Kim and Nick Feamster, Georgia Institute of Technology 2013 IEEE Communications Magazine Presented by 101062505 林 瑋 琮 Outline 1. Introduction
GDS Resource Record: Generalization of the Delegation Signer Model
GDS Resource Record: Generalization of the Delegation Signer Model Gilles Guette, Bernard Cousin, David Fort To cite this version: Gilles Guette, Bernard Cousin, David Fort. GDS Resource Record: Generalization
Territorial Intelligence and Innovation for the Socio-Ecological Transition
Territorial Intelligence and Innovation for the Socio-Ecological Transition Jean-Jacques Girardot, Evelyne Brunau To cite this version: Jean-Jacques Girardot, Evelyne Brunau. Territorial Intelligence and
PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK
http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,
An Automatic Reversible Transformation from Composite to Visitor in Java
An Automatic Reversible Transformation from Composite to Visitor in Java Akram To cite this version: Akram. An Automatic Reversible Transformation from Composite to Visitor in Java. CIEL 2012, P. Collet,
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
Boosting Business Agility through Software-defined Networking
Executive Summary: Boosting Business Agility through Software-defined Networking Completing the last mile of virtualization Introduction Businesses have gained significant value from virtualizing server
Study on Cloud Service Mode of Agricultural Information Institutions
Study on Cloud Service Mode of Agricultural Information Institutions Xiaorong Yang, Nengfu Xie, Dan Wang, Lihua Jiang To cite this version: Xiaorong Yang, Nengfu Xie, Dan Wang, Lihua Jiang. Study on Cloud
Adapting Distributed Hash Tables for Mobile Ad Hoc Networks
University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and
Network Management through Graphs in Software Defined Networks
Network Management through Graphs in Software Defined Networks Gustavo Pantuza, Frederico Sampaio, Luiz F. M. Vieira, Dorgival Guedes, Marcos A. M. Vieira Departament of Computer Science Universidade Federal
A usage coverage based approach for assessing product family design
A usage coverage based approach for assessing product family design Jiliang Wang To cite this version: Jiliang Wang. A usage coverage based approach for assessing product family design. Other. Ecole Centrale
Security improvement in IoT based on Software Defined Networking (SDN)
Security improvement in IoT based on Software Defined Networking (SDN) Vandana C.P Assistant Professor, New Horizon College of Engineering Abstract With the evolving Internet of Things (IoT) technology,
EventBus Module for Distributed OpenFlow Controllers
EventBus Module for Distributed OpenFlow Controllers Igor Alekseev Director of the Internet Center P.G. Demidov Yaroslavl State University Yaroslavl, Russia [email protected] Mikhail Nikitinskiy System
OpenFlow and Onix. OpenFlow: Enabling Innovation in Campus Networks. The Problem. We also want. How to run experiments in campus networks?
OpenFlow and Onix Bowei Xu [email protected] [1] McKeown et al., "OpenFlow: Enabling Innovation in Campus Networks," ACM SIGCOMM CCR, 38(2):69-74, Apr. 2008. [2] Koponen et al., "Onix: a Distributed Control
Multiple Service Load-Balancing with OpenFlow
2012 IEEE 13th International Conference on High Performance Switching and Routing Multiple Service Load-Balancing with OpenFlow Marc Koerner Technische Universitaet Berlin Department of Telecommunication
A graph based framework for the definition of tools dealing with sparse and irregular distributed data-structures
A graph based framework for the definition of tools dealing with sparse and irregular distributed data-structures Serge Chaumette, Jean-Michel Lepine, Franck Rubi To cite this version: Serge Chaumette,
Disaster-Resilient Backbone and Access Networks
The Workshop on Establishing Resilient Life-Space in the Cyber-Physical Integrated Society, March. 17, 2015, Sendai, Japan Disaster-Resilient Backbone and Access Networks Shigeki Yamada ([email protected])
A Passive Method for Estimating End-to-End TCP Packet Loss
A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se
FP-Hadoop: Efficient Execution of Parallel Jobs Over Skewed Data
FP-Hadoop: Efficient Execution of Parallel Jobs Over Skewed Data Miguel Liroz-Gistau, Reza Akbarinia, Patrick Valduriez To cite this version: Miguel Liroz-Gistau, Reza Akbarinia, Patrick Valduriez. FP-Hadoop:
Proposal for the configuration of multi-domain network monitoring architecture
Proposal for the configuration of multi-domain network monitoring architecture Aymen Belghith, Bernard Cousin, Samer Lahoud, Siwar Ben Adj Said To cite this version: Aymen Belghith, Bernard Cousin, Samer
Comparison of WCA with AODV and WCA with ACO using clustering algorithm
Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Mobility Management Framework in Software Defined Networks
, pp. 1-10 http://dx.doi.org/10.14257/ijseia.2014.8.8,01 Mobility Management Framework in Software Defined Networks Kyoung-Hee Lee Department of Computer Engineering, Pai Chai University, Korea [email protected]
Can Software Defined Networks (SDN) manage the dependability of the service provided to selected customers?
Can Software Defined Networks (SDN) manage the dependability of the service provided to selected customers? Gianfranco Nencioni Dipartimento di Ingegneria dell Informazione Università di Pisa Mini-seminar
Additional mechanisms for rewriting on-the-fly SPARQL queries proxy
Additional mechanisms for rewriting on-the-fly SPARQL queries proxy Arthur Vaisse-Lesteven, Bruno Grilhères To cite this version: Arthur Vaisse-Lesteven, Bruno Grilhères. Additional mechanisms for rewriting
Packet Level Authentication Overview
Packet Level Authentication Overview Dmitrij Lagutin, [email protected] Helsinki Institute for Information Technology HIIT Aalto University School of Science and Technology Contents Introduction
Achieving Load Balancing in Wireless Mesh Networks Through Multiple Gateways
Abstract Achieving Load Balancing in Wireless Mesh Networks Through Multiple Gateways Deepti Nandiraju, Lakshmi Santhanam, Nagesh Nandiraju, and Dharma P. Agrawal Center for Distributed and Mobile Computing,
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
Donatella Corti, Alberto Portioli-Staudacher. To cite this version: HAL Id: hal-01055802 https://hal.inria.fr/hal-01055802
A Structured Comparison of the Service Offer and the Service Supply Chain of Manufacturers Competing in the Capital Goods and Durable Consumer Goods Industries Donatella Corti, Alberto Portioli-Staudacher
How To Make A Network Plan Based On Bg, Qos, And Autonomous System (As)
Policy Based QoS support using BGP Routing Priyadarsi Nanda and Andrew James Simmonds Department of Computer Systems Faculty of Information Technology University of Technology, Sydney Broadway, NSW Australia
End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich
End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless
TinySDN: Enabling TinyOS to Software-Defined Wireless Sensor Networks
TinySDN: Enabling TinyOS to Software-Defined Wireless Sensor Networks Bruno T. de Oliveira 1, Cíntia B. Margi 1 1 Escola Politécnica Universidade de São Paulo Departamento de Engenharia de Computação e
Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks
1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166
TOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
Monitoring within an Autonomic Network: A. Framework
Monitoring within an Autonomic Network: A GANA based Network Monitoring i Framework Anastasios Zafeiropoulos, Athanassios Liakopoulos, Alan Davy, Ranganai Chaparadza [email protected] Greek Research and
Software-Defined Networking for Wi-Fi White Paper
Software-Defined Networking for Wi-Fi Introduction Software-Defined Networking for Wi-Fi The explosion in the number and diversity of wireless devices in today s enterprise networks has increased the pressure
A model driven approach for bridging ILOG Rule Language and RIF
A model driven approach for bridging ILOG Rule Language and RIF Valerio Cosentino, Marcos Didonet del Fabro, Adil El Ghali To cite this version: Valerio Cosentino, Marcos Didonet del Fabro, Adil El Ghali.
A collaborative model for routing in multi-domains OpenFlow networks
A collaborative model for routing in multi-domains OpenFlow networks Xuan Thien Phan, Nam Thoai Faculty of Computer Science and Engineering Ho Chi Minh City University of Technology Ho Chi Minh city, Vietnam
Kandoo: A Framework for Efficient and Scalable Offloading of Control Applications
Kandoo: A Framework for Efficient and Scalable Offloading of Control s Soheil Hassas Yeganeh University of Toronto [email protected] Yashar Ganjali University of Toronto [email protected] ABSTRACT
QASM: a Q&A Social Media System Based on Social Semantics
QASM: a Q&A Social Media System Based on Social Semantics Zide Meng, Fabien Gandon, Catherine Faron-Zucker To cite this version: Zide Meng, Fabien Gandon, Catherine Faron-Zucker. QASM: a Q&A Social Media
Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks
1 Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks Leonardo Ochoa-Aday, Cristina Cervello -Pastor, Member, IEEE, and Adriana Ferna ndez-ferna ndez Abstract The explosion
Foundation University, Islamabad, Pakistan [email protected]
Kerberos Authentication in Wireless Sensor Networks Qasim Siddique Foundation University, Islamabad, Pakistan [email protected] ABSTRACT We proposed an authentication mechanism in the wireless sensor
An Intelligent Framework for Vehicular Ad-hoc Networks using SDN Architecture
435 An Intelligent Framework for Vehicular Ad-hoc Networks using SDN Architecture Balamurugan.V School of Computing Science and Engineering, VIT University Chennai Campus, 600127, Tamilnadu, India. Abstract
Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios
Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios Erwan Godefroy, Eric Totel, Michel Hurfin, Frédéric Majorczyk To cite this version: Erwan Godefroy, Eric Totel, Michel Hurfin,
Transactional Support for SDN Control Planes "
Transactional Support for SDN Control Planes Petr Kuznetsov Telecom ParisTech WTTM, 2015 Software Defined Networking An emerging paradigm in computer network management Separate forwarding hardware (data
Security Design. [email protected] http://wwwiuk.informatik.uni-rostock.de/
Security Design [email protected] http://wwwiuk.informatik.uni-rostock.de/ Content Security Design Analysing Design Requirements Resource Separation a Security Zones VLANs Tuning Load Balancing
Lightweight Security using Identity-Based Encryption Guido Appenzeller
Lightweight Security using Identity-Based Encryption Guido Appenzeller Chief Technology Officer Voltage Security Inc. Identity-Based Encryption (IBE) IBE is a new public key encryption algorithm A number
Online vehicle routing and scheduling with continuous vehicle tracking
Online vehicle routing and scheduling with continuous vehicle tracking Jean Respen, Nicolas Zufferey, Jean-Yves Potvin To cite this version: Jean Respen, Nicolas Zufferey, Jean-Yves Potvin. Online vehicle
Extending the Internet of Things to IPv6 with Software Defined Networking
Extending the Internet of Things to IPv6 with Software Defined Networking Abstract [WHITE PAPER] Pedro Martinez-Julia, Antonio F. Skarmeta {pedromj,skarmeta}@um.es The flexibility and general programmability
Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue3 March, 2014 Page No. 5067-5071 Secured Data Transmissions In Manet Using Neighbor Position Verfication
Dynamic Controller Provisioning in Software Defined Networks
Dynamic Controller Provisioning in Software Defined Networks Md. Faizul Bari, Arup Raton Roy, Shihabur Rahman Chowdhury, Qi Zhang, Mohamed Faten Zhani, Reaz Ahmed, and Raouf Boutaba David R. Cheriton School
Deployment Scenarios
Deployment Scenarios Sun Cobalt Summary The Sun Cobalt is a network-based appliance for managing a large number of remote servers and for deploying services to these servers. A control station is deployed
Effective disaster recovery using Software defined networking
Effective disaster recovery using Software defined networking Thyagaraju, Mrs. Jyothi. K.S, Girish.L PG Student, Associate professor, Assistant Professor Dept of CSE, Cit, Gubbi, Tumkur Abstract In this
1 Product. Open Text is the leading fax server vendor in the world. *
1 Product Open Text Fax s Replace fax machines and inefficient paper processes with efficient and secure computer-based faxing and electronic document delivery Open Text is the leading fax server vendor
Opnet Based simulation for route redistribution in EIGRP, BGP and OSPF network protocols
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 1, Ver. IV (Jan. 2014), PP 47-52 Opnet Based simulation for route redistribution
Faut-il des cyberarchivistes, et quel doit être leur profil professionnel?
Faut-il des cyberarchivistes, et quel doit être leur profil professionnel? Jean-Daniel Zeller To cite this version: Jean-Daniel Zeller. Faut-il des cyberarchivistes, et quel doit être leur profil professionnel?.
Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography
Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography Liang Yan, Chunming Rong, and Gansen Zhao University of Stavanger, Norway {liang.yan,chunming.rong}@uis.no
Software Defined Networking Architecture
Software Defined Networking Architecture Brighten Godfrey CS 538 October 8 2013 slides 2010-2013 by Brighten Godfrey The Problem Networks are complicated Just like any computer system Worse: it s distributed
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
On the performance of group key management protocols in MANETs
On the performance of group key management protocols in MANETs Mohamed Salah Bouassida, Mohamed Bouali To cite this version: Mohamed Salah Bouassida, Mohamed Bouali. On the performance of group key management
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
Bit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare [email protected] https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
Performance evaluation of QoS in wireless networks using IEEE 802.11e
Performance evaluation of QoS in wireless networks using IEEE 802.11e Laio B. Vilas Boas, Pedro M. C. Massolino, Rafael T. Possignolo, Cintia B. Margi and Regina M. Silveira Abstract The increase demand
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT
A Comparison of Protocols for Device Management and Software Updates
B L A C K B E R R Y M 2 M S O L U T I O N S A Comparison of Protocols for Device Management and Software Updates In the last two decades, the number of connected computing devices has grown at a staggering
Expanding Renewable Energy by Implementing Demand Response
Expanding Renewable Energy by Implementing Demand Response Stéphanie Bouckaert, Vincent Mazauric, Nadia Maïzi To cite this version: Stéphanie Bouckaert, Vincent Mazauric, Nadia Maïzi. Expanding Renewable
Preventing Unauthorized Messages and Achieving End-to-End Security in Delay Tolerant Heterogeneous Wireless Networks
152 JOURNAL OF COMMUNICATIONS, VOL. 5, NO. 2, FEBRUARY 2010 Preventing Unauthorized Messages and Achieving End-to-End Security in Delay Tolerant Heterogeneous Wireless Networks Hany Samuel and Weihua Zhuang
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method
An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method E.Sathiyamoorthy 1, S.S.Manivannan 2 1&2 School of Information Technology and Engineering
When SDN meets Mobility
When SDN meets Mobility The result is an automated, simpler network that supports the way you work With wireless increasingly becoming the primary means of access for end users, it is essential that any
Enabling Fast Failure Recovery in OpenFlow Networks
Enabling Fast Failure Recovery in OpenFlow Networks Sachin Sharma, Dimitri Staessens, Didier Colle, Mario Pickavet and Piet Demeester Ghent University - IBBT, Department of Information Technology (INTEC),
Security for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
Autonomicity Design in OpenFlow Based Software Defined Networking
GC'12 Workshop: The 4th IEEE International Workshop on Management of Emerging Networks and Services Autonomicity Design in OpenFlow Based Software Defined Networking WANG Wendong, Yannan HU, Xirong QUE,
