Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.23919/INM.2017.7987279guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
research-article

INSpIRE: Integrated NFV-based Intent Refinement Environment

Published: 08 May 2017 Publication History

Abstract

Many aspects of the management of computer networks, such as quality of service and security, must be taken into consideration to ensure that the network meets the users and clients demands. Fortunately, management solutions were developed to address these aspects, such as Intent-Based Networking (IBN). IBN is a novel networking paradigm that abstracts network configurations by allowing administrators to specify how the network should behave and not what it should do. In this paper, we introduce an IBN solution called INSpIRE (Integrated NFV-based Intent Refinement Environment). INSpIRE implements a refinement technique to translate intents into a set of configurations to perform a desired service chain in both homogeneous environments (VNFs only) and heterogeneous environments (VNFs and physical middleboxes). Our solution is capable of (i) determining the specific VNFs required to fulfill an intent, (ii) chaining these VNFs according to their dependencies, and (iii) presenting enough low-level information to network devices for posterior traffic steering. Finally, to assess the feasibility of our solution we detail a case study that reflects real-world management situations and evaluate the scalability of the refinement process.

References

[1]
D. C. Verma, Principles of Computer Systems and Network Management, 1st ed. Springer Publishing Company Incorporated, 2009.
[2]
J. D. Case, M. Fedor, M. L. Schoffstall, and J. R. Davin, “Simple Network Management Protocol (SNMP),” Internet Requests for Comments, RFC Editor, STD 15, May 1990.
[3]
J. Strassner, Policy-Based Network Management: Solutions for the Next Generation (The Morgan Kaufmann Series in Networking). San Francisco, CA, USA: Morgan Kaufmann Publishers Inc., 2003.
[4]
D. C. Verma, “Simplifying Network Administration Using Policy-based Management,” Netwrk. Mag. of Global Intemetwkg.. vol. 16, no. 2, pp. 20–26, Mar. 2002.
[5]
M. Behringer, M. Pritikin, S. Bjarnason, A. Clemm, B. Carpenter, S. Jiang, and L. Ciavaglia, “Autonomic Networking: Definitions and Design Goals,” RFC 7575 (Informational), 2015.
[6]
N. Feamster, J. Rexford, and E. Zegura, “The Road to SDN: An Intellectual History of Programmable Networks,” SIGCOMM Comput. Commun. Rev., vol. 44, no. 2, pp. 87–98, Apr. 2014.
[7]
“Network Functions Virtualisation (NFV),” White Paper, European Telecommunications Standards Institute (ETSI), october 2014.
[8]
P. Quinn and T. Nadeau, “Problem Statement for Service Function Chaining,” RFC 7498 (Informational), Internet Engineering Task Force, 2015.
[9]
N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner, “OpenFlow: Enabling Innovation in Campus Networks,” SIGCOMM Comput. Commun. Rev., vol. 38, no. 2, pp. 69–74, Mar. 2008.
[10]
J. D. Moffett and M. S. Sloman, “Policy Hierarchies for Distributed Systems Management,” IEEE Journal on Selected Areas in Communications, vol. 11, no. 9, pp. 1404–1414, Dec 1993.
[11]
R. Craven, J. Lobo, E. Lupu, A. Russo, and M. Sloman, “Policy Refinement: Decomposition and Operationalization for Dynamic Domains,” in Network and Service Management (CNSM), 2011 7th International Conference on, Oct 2011, pp. 1–9.
[12]
E. J. Scheid, C. C. Machado, R. L. dos Santos, A. E. Schaeffer-Filho, and L. Z. Granville, “Policy-based dynamic service chaining in Network Functions Virtualization,” in 2016 IEEE Symposium on Computers and Communication (ISCC), June 2016, pp. 340–345.
[13]
European Telecommunications Standards Institute (ETSI), “ETSI Group Specification Network Functions Virtualisation (NFV); Management and Orchestration,” 2014, deliverable 1. 1. 1. Available from http://www.etsi.org/deliver/etsi_gs/NFV-MAN/001_099/001/01.01.01_60/gs_NFV-MAN001v010101p.pdf [accessed 17 Dez 2015].
[14]
A. K. Bandara, E. C. Lupu, J. Moffett, and A. Russo, “A Goal-based Approach to Policy Refinement,” in Proceedings of the Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, ser. POLICY '04. Washington, DC, USA: IEEE Computer Society, 2004, pp. 229.
[15]
J. Rubio-Loyola, J. Serrat, M. Charalambides, P. Flegkas, and G. Pavlou, “A Functional Solution for Goal-Oriented Policy Refinement,” in Policies for Distributed Systems and Networks, 2006. Policy 2006. Seventh IEEE InternationalWorkshop on. IEEE, 2006, pp. 133–144.
[16]
N. Damianou, N. Dulay, E. Lupu, and M. Sloman, “The Ponder Policy Specification Language,” in Proceedings of the International Workshop on Policies for Distributed Systems and Networks, ser. POLICY '01. London, UK, UK: Springer-Verlag, 2001, pp. 18–38.
[17]
N. Foster, R. Harrison, M. J. Freedman, C. Monsanto, J. Rexford, A. Story, and D. Walker, “Frenetic: A Network Programming Language,” in Proceedings of the 16th ACM SIGPLAN International Conference on Functional Programming, ser. ICFP '11. New York, NY, USA: ACM, 2011, pp. 279–291.
[18]
C. C. Machado, J. A. Wickboldt, L. Z. Granville, and A. Schaeffer-Filho, “An EC-based Formalism for Policy Refinement in Software-Defined Networking,” in 2015 IEEE Symposium on Computers and Communication (lSCC), July 2015, pp. 496–501.
[19]
L. Chung and J. C. Prado Leite, “Conceptual Modeling: Foundations and Applications,” A. T. Borgida, V. K. Chaudhri, P. Giorgini, and E. S. Yu, Eds. Springer-Verlag, 2009, ch. On Non-Functional Requirements in Software Engineering, pp. 363–379.
[20]
L. Chung, B. A. Nixon, E. Yu, and J. Mylopoulos, Non-Functional Requirements in Software Engineering, 1st ed. Springer Publishing Company Incorporated, 2000.
[21]
K. A. Scarfone and P. M. Mell, “SP 800-94. Guide to Intrusion Detection and Prevention Systems (IDPS),” Gaithersburg, MD, United States, Tech. Rep., 2007.
[22]
A. Affleck and A. Krishna, “Supporting Quantitative Reasoning of Nonfunctional Requirements: A Process-oriented Approach,” in Proceedings of the International Conference on Software and System Process, ser. ICSSP '12, 2012, pp. 88–92.
[23]
J. Macqueen, “Some Methods for Classification and Analysis of Multivariate Observations,” in In 5-th Berkeley Symposium on Mathematical Statistics and Probability, 1967, pp. 281–297.
[24]
A. A. Hagberg, D. A. Schult, and P. J. Swart, “Exploring Network Structure, Dynamics, and Function using NetworkX,” in Proceedings of the 7th Python in ScienceConference, G. Varoquaux, T. Vaught, and J. Millman, Eds., Pasadena, CA USA, 2008, pp. 11–15.
[25]
E. Jones, T. Oliphant, P. Peterson et al., “SciPy: Open source scientific tools for Python,” 2001. [Online]. Available: http://www.scipy.org/

Cited By

View all
  • (2023)Automation for Network Security Configuration: State of the Art and Research TrendsACM Computing Surveys10.1145/361640156:3(1-37)Online publication date: 5-Oct-2023
  • (2023)SLA Management in Intent-Driven Service Management Systems: A Taxonomy and Future DirectionsACM Computing Surveys10.1145/358933955:13s(1-38)Online publication date: 13-Jul-2023
  • (2023)Intent-driven autonomous network and service management in future cellular networksComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2022.109477220:COnline publication date: 1-Jan-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)
May 2017
1249 pages

Publisher

IEEE Press

Publication History

Published: 08 May 2017

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 04 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Automation for Network Security Configuration: State of the Art and Research TrendsACM Computing Surveys10.1145/361640156:3(1-37)Online publication date: 5-Oct-2023
  • (2023)SLA Management in Intent-Driven Service Management Systems: A Taxonomy and Future DirectionsACM Computing Surveys10.1145/358933955:13s(1-38)Online publication date: 13-Jul-2023
  • (2023)Intent-driven autonomous network and service management in future cellular networksComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2022.109477220:COnline publication date: 1-Jan-2023
  • (2022)SecureWeaver: Intent-Driven Secure System DesignerProceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems10.1145/3510547.3517923(107-116)Online publication date: 18-Apr-2022

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media