Bandwidth Control and Regulation in Mobile Networks via SDN/NFV-Based Platforms Abstract
|
|
|
- Dulcie Rodgers
- 10 years ago
- Views:
Transcription
1 Bandwidth Control and Regulation in Mobile Networks via SDN/NFV-Based Platforms Thomas Anderson, Peter Bosch, Alessandro Duminuco, for GSMA / IAB workshop, September 2015 Abstract We explain why Software Defined Networking (SDN) and Network Function Virtualization (NFV) play an important role in evolving the mobile packet core and the systems that are deployed at the boundary between the mobile packet network and data networks such as the Internet and enterprise networks. These systems (DPI, video optimization, content caching, etc ) are precisely those most affected by the pervasive use of encryption in mobile networks. This position paper describes a use case for a platform that employs SDN and NFV concepts that is used to mitigate the effects of encryption and address the mobile operator needs for regulating and managing traffic for better QoE. 1 INTRODUCTION The fraction of encrypted traffic traversing (mobile) networks is rapidly increasing. The main driver for this phenomenon is the adoption of TLS/SSL protocol by many content owners and providers, either in conjunction with HTTP/1.1 or as a base requirement in HTTP/2.0/SPDY. The encryption trend leads to a significant impact on the (mobile) service providers ability to provide reasonable network management mechanisms in their networks. As their networks are increasingly traversed by opaque data flows, service providers are no longer able to use traditional packet inspection techniques to analyze and regulate this traffic for improved network performance and user Quality of Experience (QoE). For (mobile) service providers to participate in the changing data-networking world where the majority of mobile traffic is encrypted, (mobile) service providers need to change their strategy regarding network traffic management. In particular mobile service providers must focus on new ways to manage their network by better leveraging their unique position in the end-to-end network chain: (1) (mobile) service providers are access gatekeepers and thus are topologically close to the edge of the network and (2) (mobile) service providers maintain an existing trust/commercial relationship with end subscribers. This translates into specific new network models which include: 1. Foster cooperative partnerships with third-party application providers and associated aggregators to expose and monetize (mobile) network functionalities and information. Such functionalities and information include channel condition information, QoS settings, subscriber identity, and other subscriber dependent information; 2. Make better use of subscriber opt-in techniques to offer value-added services to (mobile) service provider subscribers; 3. Enable content owners and content providers to securely run their value-added services in the (mobile) service provider s network itself. These services include content caches, web-servers, optimization engines, etc ; and 4. (Mobile) service providers to become content providers themselves to enable their own service offerings to content owners. This paper focuses in particular on the first three points and argues how NFV and SDN technologies play a key role in providing the necessary flexibility and control granularity needed to implement them.
2 2 RAPID INCREASE OF ENCRYPTED TRAFFIC IN OPERATOR NETWORKS The underlying reasons for the rapid increase of carrying web and (smart-phone) application traffic in encrypted forms are as follows: Subscribers increasingly demand privacy and authentication in web transactions, especially for highly sensitive applications such as e-banking and e-commerce, but it is also critically important for any kind of application that handles personal information such as s, social networks, instant messaging, etc. Given today s public opinion on privacy, it has also become a significant business risk for companies to leak customer-private data or as being perceived as callous with such data. Indeed, in many jurisdictions world-wide privately identifiable information is protected by law. Content owners need full and exclusive control over the content they serve. These content owners need to avoid any middle-box service that handles, inspects or modifies their content, and as such, these companies need to avoid middle-boxes to derive value from content owner s data. While the reasons above explain why subscribers and content providers are willing to encrypt their conversations, the factor that is currently driving most of the increase in TLS adoption is the introduction of HTTP alternatives, such as SPDY/HTTP2.0 [1][2]. Moreover, smart-phone application traffic deploys secure communication channels as well. These protocols have been conceived to reduce latency of web-content delivery over the TCP protocol and include by default TLS based encryption. In addition, smart phone applications increasingly use encrypted channels to communicate between the mobile device and the (cloud-based) applications. SPDY proxies further hide regular HTTP traffic by creating an encrypted conversation tunnel between a collaborative client device (with its browser properly configured) and the SPDY proxy. This tunnel carries all web/spdy requests generated by said device. The SPDY proxy extracts the requests from the tunnel, opens and maintains regular HTTP(S) sessions tunnels to the final Internet destinations, retransmits the original web requests, and re-aggregates the web-server s responses into the SPDY tunnel back to the client. Such a scheme prevents middle boxes from even detecting the final destination of the HTTP traffic. Thus, in addition, SPDY proxies can also negatively impact CDN and caching performance since the proxy itself may not be optimally located for CDN performance as compared to the option where the device goes direct to a CDN / cache. 3 CHALLENGES FOR MOBILE SERVICE PROVIDERS Traditionally mobile service providers manage traffic in their network by applying service functions through middle boxes and other inline appliances and by placing these functions between the mobile packet core and the Internet/enterprise networks. All data transmitted from and to the mobile device is additionally routed through the middle boxes. These service functions are virtual or physical boxes deployed and chained into what is commonly referred to as Gi-LAN infrastructure. This is named the Gi-LAN infrastructure after the 3GPP specified (S)Gi-Interface. Figure 1 Traditional 3GPP Gi-LAN Architecture Most of the services included in current Gi-LAN deployments need to access and/or modify data traversing the network. These include:
3 Content-optimization boxes: video transcoders can optimize videos to the specific target device; image compressors can adapt the image size and quality to the radio access conditions; HTTP(S) proxies can reformat HTML to be tiny screen friendly, etc. TCP optimization proxies: TCP is known to operate poorly in a mobile access network and special TCP proxies can be adopted to mitigate the existing inefficiencies. Caching functions: frequently accessed data can be cached at the edge of the network achieving both reduced latency and reduced peering costs. Content-based filters: URL-based filtering can implement parental controls, and DPI based traffic detection can enforce fair-use capping or blocking. Security-based intrusion detection/mitigation appliances: scan traffic for malicious traffic. Charging functions: implement special charging relationships with 3 rd parties to allow certain classes of customer traffic to be billed to the 3 rd party rather than the subscriber (contingent on country and local regulations). Ad-insertion engines: HTTP proxies are able to insert targeted advertisements. Header-enrichment proxies: Exposing mobile network information allows content providers to optimize content. Analytics engines: Monitors collect and monetize user behavior statistics. Most of these services are severely constrained if not infeasible when data flows are encrypted end-to-end. This is a side effect of protecting user privacy but also an explicit intent of content providers advocating for encryption. 4 POSSIBLE MOBILE SERVICE PROVIDERS STRATEGIES The scenario described earlier clearly demands a strategy evolution in mobile service provider networks to re-enable the network management and subscriber benefits that may be lost with pervasive encryption. As access providers, mobile service providers still hold a key position that cannot be easily circumvented by so called over the top and 3 rd party providers: Mobile service providers hold commercial/billing relationship with end customers. Mobile service providers manage their access networks, i.e., mobile service providers are gatekeepers of the mobile Internet and/or enterprise networks, which includes the ability to monitor traffic and manage congestion, to control subscribers network access methods and to influence methods for consumption and payment for data access. Mobile service providers are topologically as close as possible to the data consumers. The mobile network maintains subscriber information and information on the access network that can be useful to content companies. These include: Subscriber identity, which with the agreement of the end user could be exposed to the content owner to enforce more robust authentication mechanisms; Subscriber meta-information, such as precise geographic location, billing category, usage patterns, mobility patterns, etc. Such information can be used to provide more targeted services or ads; and Access-channel information, such as radio-link quality, channel congestion, radioaccess technology. Access to such information enables content providers to better adapt content to the current access capabilities.
4 Moreover the mobile network implements functionalities that subscribers and content companies are willing to pay for. These functionalities include: Ability to upgrade/downgrade the access QoS. For example, in 4G networks the mobile network operator can create a dedicated bearer with particular QoS settings that carry specific flows [6]. This can be used to prioritize and improve the quality of experience of certain content consumption; Ability to offer advanced parental control and security scanning services to mobile subscribers; Ability to use the billing relationship with the mobile customer to pay third-party services (with user consent); and Allowing third parties to sponsor the mobile data delivery, i.e., content companies can pay the bill for the delivery of certain content. 5 HOW SDN/NFV GI-LAN PLATFORM HELPS Effectively implementing earlier described services and capabilities in an encrypted networked world can benefit from a new virtualized Gi-LAN infrastructure. Such an infrastructure leverages SDN technology and ETSI NFV-based function delivery by way of deploying services through virtual machines 1 generally called ETSI NFV Virtual Network Function-Components (VNF-Cs). This new infrastructure combines virtual function delivery with service chains e.g., by way of NSH-based service chains [10]. Key elements of this new virtual Gi-LAN platform include: A subscriber-aware policy function that can provide subscriber specific guidance on how traffic flows may be differentially handled within the platform on a per-subscriber and per flow basis. This can be considered a subscriber-aware SDN controller; A classification function to classify traffic based on the above referenced subscriberaware policy function into specific service chains dynamically. Changes in subscriber policy can be reflected into changes in service path assignments in real time. Each specific service path includes a specified set of service functions required to manage traffic assigned to the specific service path; A switching function to efficiently support service path switching (e.g. IETF SFC enabled); New service functions designed to better monitor and manage encrypted traffic; and All on an ETSI NFV compliant virtualization platform that enables dynamic growth of service capacity of the service platform. The virtualization platform s role is to track the liveliness of deployed VNF-Cs, to auto-scale VNF-C capacity to demand, and to programs service chains through the SDN infrastructure. This platform is flexible and elastic such that it can support a wide variety of use cases and services addressing the encrypted and non-encrypted network environment. Specific use cases include allowing Gi-LAN services to expose service provider functionalities and information to third parties, or in enabling third party content providers to install their own services in a mobile service provider s Gi-LAN platform. 1 Please note that virtual machines is used in the broadest sense here: these can be bare-metal deployments, containers, Qemu-based virtual machines, or any other type of virtual deployment.
5 6 GI-LAN MULTITENANCY FOR THIRD PARTIES As described earlier, many of the mobile core services cannot provide their services when exposed to encrypted data flows. However, some of them, such as content caches, are most effective when run closer to the edge of the network. This is because (1) these caches can provide lower latency experience for end-users; and (2) they allow for the maximum savings in terms of (Internet) peering costs. Although the most convenient place for content cache services to be deployed in a mobile network is the Gi-LAN infrastructure, the opacity of encrypted flows prevents mobile service providers from running these Gi-LAN services on their own. Instead, we propose mobile service providers to provide content caches as-a-service and allow content companies, i.e., those companies that hold content and the associated encryption keys, to control the content caches hosted by the mobile service providers. Moreover, mobile service providers can also allow content companies to install their own services, thus enabling 3 rd parties to host a mix of service provider functions and 3 rd party functions in a common virtual Gi-LAN infrastructure. The mere fact that Gi-LAN service infrastructures can be offered through an as-as-service offering with ETSI NFV and SDN technologies at the heart of the virtual deployment, enables such over-the-top and 3 rd party service deployments inside the mobile service core. When compared to a traditional Gi-LAN infrastructure, typically implemented as a bespoke, physical network element solution, deploying such 3 rd party services in a ETSI NFV-based environment greatly enhances the a 3 rd party s ability to offer enhanced services close to the edge of the network in a bespoke, physical deployment, over-the-top and 3 rd party providers can only provide for their services in the mobile network by way of physically installing a box with the service in the mobile network. The key benefit for the mobile service provider is that the mobile service provider can monetize its access networks through new methods: the mobile service provider can create a service offering from over-the-top and 3 rd party content providers. Since virtual services are deployed in service chains, e.g. by way of IETF SFC, a mobile service provider can even provide a concatenation of over-the-top and 3 rd party services in their networks. For these optimization scenarios to be viable, the content companies need to secure their content from the mobile service provider for legal or business reasons and maintain the end-to-end security relationship between the subscriber and their services. Mobile service providers must offer secure hosting capabilities in the Gi-LAN service area to enforce privacy for content companies in the service provider s infrastructure through existing and novel hosting techniques. While absolute privacy cannot be guaranteed in cloud systems 2, cloud-orchestration systems can manage secure and private hosting. In addition, novel techniques can be used in case 3rd party service functions need to be chained in such cloud systems. To encourage content companies to acquire virtual Gi-LAN hosting services, mobile service providers can make the services described in the previous section available only locally within the mobile service provider network. This approach can also increase the manageability and security of the services. 2 At least, with today s cloud-computing hardware.
6 Figure 2 Gi-LAN multitenancy architecture Content provider services hosted in a virtual Gi-LAN system likely need to exchange information with the origin content servers, for example: information collected by the mobile network, session encryption keys, or other data flow meta-information. This exchange can be provided for by way of an out-of-band or tunnel-based channel. This means that a mobile service provider needs to enable direct communication between the over-the-top/3 rd party service provider and their services operating within the confines of the mobile service provider s cloud systems. This requirement places specific networking and scaling constraints for over-the-top/3 rd party service provider operating inside the mobile service provider s network. Moreover, specifically on scaling functions, there needs to be a closed-control loop between the mobile service provider s ETSI NFV and SDN solutions and the over-the-top/3 rd party control center to manage the virtual deployments securely and effectively. 7 CONCLUSION The growing rate of encryption of data traversing mobile network requires mobile service providers to evolve the way they manage their network. This paper argues for a strategy evolution in mobile service provider networks to re-enable the network management and subscriber benefits that may be lost with pervasive encryption, specifically leveraging the privileged position mobile service providers have. Such involvement can be implemented in many different ways and would greatly benefit from a new, subscriber/policy aware, dynamic, NFV/SDN enabled Gi-LAN architecture. 8 REFERENCES [1] SPDY white paper ( [2] M. Belshe, R. Peon, M. Thomson, A. Melnikov, Hypertext Transfer Protocol version 2.0, IETF draft [3] State of the Mobile Service Provider: Middleboxes and SPDY, Cisco White Paper, 2013 [4] Jeffrey Erman, Vijay Gopalakrishnan, Rittwik Jana, K.K. Ramakrishnan, Towards a SPDY ier Mobile Web?, In ACM CoNext 2013 [5] United States Courd of Appeals, No , Jan-2014 ( [6] 3GPP TS V12.3.0, 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Non-Access-Stratum (NAS) protocol for Evolved Packet System (EPS); Stage 3 (Release 12) [7] ATIS , ATIS standard on CDN Interconnection Use Cases and Requirements in a Multi-Party Federation Environment, Alliance for Telecommunication Industry Solutions, 2012 [8] K. Leung, Y. Lee, Content Distribution Network Interconnection (CDNI) Requirements, IETF draft [9] ATIS, An Analysis of the SPDY Protocol and the SPDY Proxy, 2014 [10] P. Quinn, U. Elzur, Network Service Header, IETF draft,
ATIS Open Web Alliance. Jim McEachern Senior Technology Consultant ATIS
Jim McEachern Senior Technology Consultant ATIS Objective This presentation provides an introduction to the, and the motivation behind its formation. 2 Overview SPDY was introduced by Google to reduce
Dynamic Service Chaining for NFV/SDN
Dynamic Service Chaining for NFV/SDN Kishore Inampudi A10 Networks, Inc. Agenda Introduction NFV Reference Architecture NFV Use cases Policy Enforcement in NFV/SDN Challenges in NFV environments Policy
CDN INTEROPERABILITY DEFINING STANDARDS THAT CAN INCREASE MARKET REACH AND UNLOCK NEW MONETIZATION OPPORTUNITIES
CDN INTEROPERABILITY DEFINING STANDARDS THAT CAN INCREASE MARKET REACH AND UNLOCK NEW MONETIZATION OPPORTUNITIES Strategic White Paper The rapid growth of over-the-top (OTT) video and multiscreen pay TV
An Analysis of the SPDY Protocol and the SPDY Proxy
An Analysis of the SPDY Protocol and the SPDY Proxy Executive Summary Web-based commerce and content continues to grow, with mobile devices accounting for an increasing portion of network traffic. In a
Virtual CPE and Software Defined Networking
Virtual CPE and Software Defined Networking Virtual CPE and Software Defined Networking Residential broadband service providers are looking for solutions that allow them to rapidly introduce innovative
S-Series SBC Interconnect Solutions. A GENBAND Application Note May 2009
S-Series SBC Interconnect Solutions A GENBAND Application Note May 2009 Business Requirements A ubiquitous global voice service offering is the challenge among today s large service providers. The need
Delivering Managed Services Using Next Generation Branch Architectures
Delivering Managed Services Using Next Generation Branch Architectures By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Versa Networks Executive Summary Network architectures for the WAN
Using SDN-OpenFlow for High-level Services
Using SDN-OpenFlow for High-level Services Nabil Damouny Sr. Director, Strategic Marketing Netronome Vice Chair, Marketing Education, ONF [email protected] Open Server Summit, Networking Applications
Corporate Network Services of Tomorrow Business-Aware VPNs
Corporate Network Services of Tomorrow Business-Aware VPNs Authors: Daniel Kofman, CTO and Yuri Gittik, CSO Content Content...1 Introduction...2 Serving Business Customers: New VPN Requirements... 2 Evolution
Examining Proxies to Mitigate Pervasive Surveillance
Examining Proxies to Mitigate Pervasive Surveillance Eliot Lear Barbara Fraser Abstract The notion of pervasive surveillance assumes that it is possible for an attacker to have access to all links and
Ensuring end-user quality in NFV-based infrastructures
Ensuring end-user quality in NFV-based infrastructures Leveraging distributed NFV cloud nodes to provide instant assessment of end-user experience EXECUTIVE SUMMARY Compute resources for virtual network
SDN and NFV in the WAN
WHITE PAPER Hybrid Networking SDN and NFV in the WAN HOW THESE POWERFUL TECHNOLOGIES ARE DRIVING ENTERPRISE INNOVATION rev. 110615 Table of Contents Introduction 3 Software Defined Networking 3 Network
APPLICATION-AWARE ROUTING IN SOFTWARE-DEFINED NETWORKS
APPLICATION-AWARE ROUTING IN SOFTWARE-DEFINED NETWORKS SARO VELRAJAN Director of Technology, Aricent APPLICATION-AWARE ROUTING IN SOFTWARE-DEFINED NETWORKS Service providers are constantly exploring avenues
Reverse Proxy with SSL - ProxySG Technical Brief
SGOS 5 Series Reverse Proxy with SSL - ProxySG Technical Brief What is Reverse Proxy with SSL? The Blue Coat ProxySG includes the functionality for a robust and flexible reverse proxy solution. In addition
Customer Benefits Through Automation with SDN and NFV
Customer Benefits Through Automation with SDN and NFV Helping service providers solve specific challenges they are facing today while improving the overall customer service life cycle 1 Table of Contents
HTTPS Inspection with Cisco CWS
White Paper HTTPS Inspection with Cisco CWS What is HTTPS? Hyper Text Transfer Protocol Secure (HTTPS) is a secure version of the Hyper Text Transfer Protocol (HTTP). It is a combination of HTTP and a
ByteMobile Adaptive Traffic Management Product Family
ByteMobile Adaptive Traffic Management Product Family Building Adaptive Traffic Management Solutions ByteMobile Adaptive Traffic Management Solutions allow mobile operators to actively and dynamically
SDN CENTRALIZED NETWORK COMMAND AND CONTROL
SDN CENTRALIZED NETWORK COMMAND AND CONTROL Software Defined Networking (SDN) is a hot topic in the data center and cloud community. The geniuses over at IDC predict a $2 billion market by 2016
Wedge Networks: Transparent Service Insertion in SDNs Using OpenFlow
Wedge Networks: EXECUTIVE SUMMARY In this paper, we will describe a novel way to insert Wedge Network s multiple content security services (such as Anti-Virus, Anti-Spam, Web Filtering, Data Loss Prevention,
The Virtual Ascent of Software Network Intelligence
White Paper The Virtual Ascent of Software Network Intelligence Prepared by Jim Hodges Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.windriver.com July 2013 Introduction Although
CDN/CLOUD/SDN/NFV FOR MULTIMEDIA SERVICES
CDN/CLOUD/SDN/NFV FOR MULTIMEDIA SERVICES Nakjung Choi, Technical Director, Bell Labs Seoul KRnet 2014, June 24 th, 2014 CONTENT Background on CDN/Cloud/SDN/NFV Video Delivery in the Existing Infrastructure
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
W H I T E P A P E R A p p l i c a t i o n D e l i v e r y f o r C l o u d S e r v i c e s : C u s t o m i z i n g S e r v i c e C r e a t i o n i n V i r t u a l E n v i r o n m e n t s Sponsored by: Brocade
Evolution of OpenCache: an OpenSource Virtual Content Distribution Network (vcdn) Platform
Evolution of OpenCache: an OpenSource Virtual Content Distribution Network (vcdn) Platform Daniel King [email protected] Matthew Broadbent [email protected] David Hutchison [email protected]
We Deliver the Future of Television The benefits of off-the-shelf hardware and virtualization for OTT video delivery
We Deliver the Future of Television The benefits of off-the-shelf hardware and virtualization for OTT video delivery istockphoto.com Introduction Over the last few years, the television world has gone
September 2009 Cloud Storage for Cloud Computing
September 2009 Cloud Storage for Cloud Computing This paper is a joint production of the Storage Networking Industry Association and the Open Grid Forum. Copyright 2009 Open Grid Forum, Copyright 2009
The Distributed Cloud: Automating, Scaling, Securing & Orchestrating the Edge
White Paper The Distributed Cloud: Automating, Scaling, Securing & Orchestrating the Edge Prepared by Jim Hodges Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.juniper.net October
The Evolution to Local Content Delivery
The Evolution to Local Content Delivery Content caching brings many benefits as operators work out how to cope with the astounding growth in demand for Internet video and other OTT content driven by Broadband
Dialogic. BorderNet Products Interwork and Connect Seamlessly and Securely at the Network Edge
Dialogic BorderNet Products Interwork and Connect Seamlessly and Securely at the Network Edge Versatile Dialogic BorderNet Products Handle Network Transitions for Today s Critical Services and Solutions
HANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: [email protected] HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
Service Chaining in Carrier Networks
White Paper Service Chaining in Carrier Networks Prepared by Gabriel Brown Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.qosmos.com February 2015 Dynamic Services, Dynamic Networks
Intel Network Builders Solution Brief. Intel and ASTRI* Help Mobile Network Operators Support Small Cell Networks
Intel Network Builders Solution Brief Intel and ASTRI* Help Mobile Network Operators Support Small Cell Networks Overview Wireless networks built using small cell base stations are enabling mobile network
How Network Transparency Affects Application Acceleration Deployment
How Network Transparency Affects Application Acceleration Deployment By John Bartlett and Peter Sevcik July 2007 Acceleration deployments should be simple. Vendors have worked hard to make the acceleration
Service Automation Made Easy
Service Automation Made Easy Networks that know how to customize the network experience for every subscriber Challenge Service providers want to quickly develop and deliver personalized services their
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
SDN/NFV Position Paper
SDN/NFV Position Paper Virtualization Working Group Justin Foster [email protected] Kapil Raina [email protected] Kelvin Ng [email protected] Cloud Security Alliance, 2015 Agenda Goals
CloudLink - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds
- The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds February 2011 1 Introduction Today's business environment requires organizations
Accurate End-to-End Performance Management Using CA Application Delivery Analysis and Cisco Wide Area Application Services
White Paper Accurate End-to-End Performance Management Using CA Application Delivery Analysis and Cisco Wide Area Application Services What You Will Learn IT departments are increasingly relying on best-in-class
Application Note. Onsight TeamLink And Firewall Detect v6.3
Application Note Onsight And Firewall Detect v6.3 1 ONSIGHT TEAMLINK HTTPS TUNNELING SERVER... 3 1.1 Encapsulation... 3 1.2 Firewall Detect... 3 1.2.1 Firewall Detect Test Server Options:... 5 1.2.2 Firewall
In-Network Programmability for Next-Generation personal Cloud service support: The INPUT project
In-Network Programmability for Next-Generation personal Cloud service support: The INPUT project Constantinos Vassilakis, PhD Athens, 2/10/2015 Motivation Trend Move functionality and services to the cloud
White Paper - Huawei Observation to NFV
White Paper - Huawei Observation to NFV White Paper - Huawei Observation to NFV 1 NFV Overview...2 1.1 Motivation for Network Function Virtualization...2 1.2 NFV Ecosystem Is Being Built Up...3 2 Major
CS6204 Advanced Topics in Networking
CS6204 Advanced Topics in Networking Assoc Prof. Chan Mun Choon School of Computing National University of Singapore Aug 14, 2015 CS6204 Lecturer Chan Mun Choon Office: COM2, #04-17 Email: [email protected]
Conference. Smart Future Networks THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF EVERYTHING
Conference THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF Smart Future Networks www.internet-of-things.no EVERYTHING Patrick Waldemar Vice President Telenor Research and Future
FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com
WebRTC for Service Providers FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com This document is copyright of FRAFOS GmbH. Duplication or propagation or
efolder White Paper: Three Network Security Tools to Block Dropbox in the Workplace
efolder White Paper: Three Network Security Tools to Block Dropbox in the Workplace December 2014 Copyright 2014, efolder, Inc. Introduction Bring your own device (BYOD) has been on the rise as employees
Ensuring end-user quality in NFV-based infrastructure
Ensuring end-user quality in NFV-based infrastructure Distributed NFV cloud nodes provide instant assessment of the end-user experience EXECUTIVE SUMMARY Compute resources for virtual network functions
Cisco Prime Network Analysis Module Software 5.1 for WAAS VB
Cisco Prime Network Analysis Module Software 5.1 for WAAS VB Network administrators need multifaceted visibility into the network and application to help ensure consistent and cost-effective delivery of
Challenges and Opportunities:
Challenges and Opportunities: The Rise of Software Centric Networking Nicolai Leymann Deutsche Telekom Technik 12.03.2015 Table of Contents 1. Todays networks and challenges 2. The New World: Software
Private Cloud Solutions Virtual Onsite Data Center
ZEROOUTAGES WHITE PAPER Private Cloud Solutions Virtual Onsite Data Center ZEROOUTAGES - WHITE PAPER Single Side / Balancing The ZeroOutages solution makes for a perfect link bonding/balancing device for
IPDR vs. DPI: The Battle for Big Data
IPDR vs. DPI: The Battle for Big Data An Incognito White Paper January 2016 2016 Incognito Software Systems Inc. All rights reserved. Contents Summary... 2 IPDR vs. DPI... 3 Overview of IPDR... 3 Overview
White Paper. Requirements of Network Virtualization
White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction
Saisei and Intel Maximizing WAN Bandwidth
Intel Network Builders Saisei Solution Brief Intel Xeon Processors Saisei and Intel Maximizing WAN Bandwidth Introduction Despite the increased capacity available on WAN links1, service providers and enterprises
ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY
ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY One of the largest concerns of organisations is how to implement and introduce advanced security mechanisms to protect
Video Analytics at the Mobile Edge - Optimizing/Monetizing Viewing Experience
WHITE PAPER Intel Architecture Intel Solid-State Drives (Intel SSD) IneoQuest* Management Platforms Networking and Communications Video Analytics at the Mobile Edge - Optimizing/Monetizing Viewing Experience
Traffic Management Solutions for Social Innovation Business
Traffic Management Solutions for Social Innovation Business Hitachi Review Vol. 63 (2014), No. 1 51 Tatsuya Shimizu Yusuke Shomura, Dr. Eng. Hirofumi Masukawa Yukiko Takeda OVERVIEW: The spread of smartphones
Leveraging SDN and NFV in the WAN
Leveraging SDN and NFV in the WAN Introduction Software Defined Networking (SDN) and Network Functions Virtualization (NFV) are two of the key components of the overall movement towards software defined
How Network Operators Do Prepare for the Rise of the Machines
Internet of Things and the Impact on Transport Networks How Network Operators Do Prepare for the Rise of the Machines Telecommunication networks today were never designed having Inter of Things use cases
NFV Management and Orchestration: Enabling Rapid Service Innovation in the Era of Virtualization
White Paper NFV Management and Orchestration: Enabling Rapid Service Innovation in the Era of Virtualization NFV Orchestration Overview Network Function Virtualization (NFV) technology, in combination
Intelligent Policy Enforcement Solutions for Broadband Service Providers
Intelligent Policy Enforcement Solutions for Broadband Service Providers To do more with your broadband network you need to see more. Imagine being able to view network activity down to the granular level,
PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ
PAVING THE PATH TO THE ELIMINATION A RSACCESS WHITE PAPER 1 The Traditional Role of DMZ 2 The Challenges of today s DMZ deployments 2.1 Ensuring the Security of Application and Data Located in the DMZ
Dialogic BorderNet Session Border Controller Solutions
Dialogic BorderNet Session Border Controller Solutions Dialogic BorderNet Session Border Controllers Transform, Connect and Secure Today s Networks and Services Dialogic BorderNet Session Border Controller
What is SDN all about?
What is SDN all about? Emil Gągała Juniper Networks Piotr Jabłoński Cisco Systems In the beginning there was a chaos CLOUD BUILDING BLOCKS CAN I VIRTUALIZE MY Compute Network? Storage Where is my money?
Cisco Wide Area Application Services Optimizes Application Delivery from the Cloud
Cisco Wide Area Application Services Optimizes Application Delivery from the Cloud What You Will Learn The adoption of cloud-based computing and applications promises to improve the agility, efficiency,
The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
Next-Generation Firewalls: Critical to SMB Network Security
Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more
Implementing LTE International Data Roaming
Implementing International Data Roaming Data Roaming Standardization Implementing International Data Roaming On completion of EPC standardization at 3GPP, specifications for international roaming between
Pervasive Security Enabled by Next Generation Monitoring Fabric
Pervasive Security Enabled by Next Generation Monitoring Fabric By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Big Switch Networks Executive Summary Enterprise networks have become ever
PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data
White Paper PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data Using credit cards to pay for goods and services is a common practice. Credit cards enable easy and
Data Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
Internet Privacy Options
2 Privacy Internet Privacy Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 19 June 2014 Common/Reports/internet-privacy-options.tex, r892 1 Privacy Acronyms
FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com
WebRTC for the Enterprise FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com This document is copyright of FRAFOS GmbH. Duplication or propagation or extracts
STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview
STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking
How To Manage A Network With A Network Management System (Qoe)
ISAAR a SDN enabled QoE Framework Chemnitz University of Technology Communication Networks Thomas M. Knoll & Marcus Eckert ({knoll & marcus.eckert} @etit.tu-chemnitz.de) Page 1 Contents Motivation Architecture
Cisco Satellite Services Platform Delivering Managed Services over Satellite
Solution Overview Cisco Satellite Services Platform Delivering Managed Services over Satellite With the increase in available bandwidth from the launch of high-throughput satellites, satellite service
IVCi s IntelliNet SM Network
IVCi s IntelliNet SM Network Technical White Paper Introduction...2 Overview...2 A True ATM Solution End to End...2 The Power of a Switched Network...2 Data Throughput:...3 Improved Security:...3 Class
LTE Congestion Management. Enabling Innovation and Improving the Consumer Experience
LTE Congestion Management Enabling Innovation and Improving the Consumer Experience January 2015 Copyright 2015 Rysavy Research, LLC. All rights reserved. http://www.rysavy.com Table of Contents NOTICE...
Understanding the Business Case of Network Function Virtualization
White paper Understanding the Business Case of Network Function Virtualization Part I of the series discusses the telecom market scenario in general, market and business drivers behind push for a building
Different NFV/SDN Solutions for Telecoms and Enterprise Cloud
Solution Brief Artesyn Embedded Technologies* Telecom Solutions Intel Xeon Processors Different NFV/SDN Solutions for Telecoms and Enterprise Cloud Networking solutions from Artesyn Embedded Technologies*
Layer 7 Visibility and Control
White Paper Layer 7 Visibility and Control FEBRUARY 2013 This document highlights the foundation of Meraki s self-learning layer 7 traffic analytics engine and the rich visibility and intuitive management
SDN PARTNER INTEGRATION: SANDVINE
SDN PARTNER INTEGRATION: SANDVINE SDN PARTNERSHIPS SSD STRATEGY & MARKETING SERVICE PROVIDER CHALLENGES TIME TO SERVICE PRODUCT EVOLUTION OVER THE TOP THREAT NETWORK TO CLOUD B/OSS AGILITY Lengthy service
Intelligent Policy Enforcement Solutions for Mobile Service Providers
Intelligent Policy Enforcement Solutions for Mobile Service Providers To do more with your wireless network you need to see more. Imagine being able to view network activity down to the granular level,
Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.
Connection Setup Process makes a REST call using the user s access key to chooses a repeater for establishing a secure connection for Local Testing. The repeater exists within the BrowserStack cloud infrastructure.
Software-Defined Network (SDN) & Network Function Virtualization (NFV) Po-Ching Lin Dept. CSIE, National Chung Cheng University
Software-Defined Network (SDN) & Network Function Virtualization (NFV) Po-Ching Lin Dept. CSIE, National Chung Cheng University Transition to NFV Cost of deploying network functions: Operating expense
TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY
IT FIREWALL POLICY TABLE OF CONTENT 1. INTRODUCTION... 3 2. TERMS AND DEFINITION... 3 3. PURPOSE... 5 4. SCOPE... 5 5. POLICY STATEMENT... 5 6. REQUIREMENTS... 5 7. OPERATIONS... 6 8. CONFIGURATION...
Network Security Topologies. Chapter 11
Network Security Topologies Chapter 11 Learning Objectives Explain network perimeter s importance to an organization s security policies Identify place and role of the demilitarized zone in the network
UK Interconnect White Paper
UK Interconnect White Paper 460 Management Management Management Management 460 Management Management Management Management AI073 AI067 UK Interconnect White Paper Introduction The UK will probably have
Accelerating Mobile Access
Mobile devices are proliferating, and their use to access applications is skyrocketing, while users are less accepting of application performance issues than ever before. Since mobile devices have limited
RemoteApp Publishing on AWS
RemoteApp Publishing on AWS WWW.CORPINFO.COM Kevin Epstein & Stephen Garden Santa Monica, California November 2014 TABLE OF CONTENTS TABLE OF CONTENTS... 2 ABSTRACT... 3 INTRODUCTION... 3 WHAT WE LL COVER...
Cisco and Visual Network Systems: Implement an End-to-End Application Performance Management Solution for Managed Services
Cisco and Visual Network Systems: Implement an End-to-End Application Performance Management Solution for Managed Services What You Will Learn In today s economy, IT departments are challenged to decide
(MPLS) MultiProtocol Labling Switching. Software Engineering 4C03 Computer Network & Computer Security Dr. Kartik Krishnan Winter 2004.
(MPLS) MultiProtocol Labling Switching Software Engineering 4C03 Computer Network & Computer Security Dr. Kartik Krishnan Winter 2004 Final Copy Researcher: Paul Chan Student ID: 9914759 Last Revised:
Application Delivery Networking
Application Delivery Networking. Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] These slides and audio/video recordings of this class lecture are at: 8-1 Overview
VIRTUALIZING THE EDGE
VIRTUALIZING THE EDGE NFV adoption to transform telecommunications infrastructure Karthik Kailasam Director, Integrated Modular Solutions September 2015 Key Messages The transformation of telecom networks
Windows Phone 8 Security Overview
Windows Phone 8 Security Overview This white paper is part of a series of technical papers designed to help IT professionals evaluate Windows Phone 8 and understand how it can play a role in their organizations.
基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器
基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器 楊 竹 星 教 授 國 立 成 功 大 學 電 機 工 程 學 系 Outline Introduction OpenFlow NetFPGA OpenFlow Switch on NetFPGA Development Cases Conclusion 2 Introduction With the proposal
