2017 IEEE Conference on Network Softwarization (NetSoft) 2017
DOI: 10.1109/netsoft.2017.8004234
|View full text |Cite
|
Sign up to set email alerts
|

End-to-end service orchestration across SDN and cloud computing domains

Abstract: This paper presents an open-source orchestration framework that deploys end-to-end services across OpenStackmanaged data centers and SDN networks controlled either by ONOS or OpenDaylight. The proposed framework improves existing software in two directions. First, it exploits SDN domains not only to implement traffic steering, but also to execute selected network functions (e.g., NAT). Second, it can deploy a service by partitioning the original service graph into multiple subgraphs, each one instantiated in a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 12 publications
(11 citation statements)
references
References 3 publications
0
11
0
Order By: Relevance
“…However, our experience shows that also the above applications can be ported to the proposed software architecture by using a mixture of bash scripting, monitoring of in‐kernel structures, and writing the equivalent of a wrapper ToY agent that implements the required northbound interface. For instance, in Bonafiglia et al, an iptables‐based VM was integrated within the overarching software architecture presented in this paper. In this respect, it is worth noticing that the mapping algorithms presented in Section have been used also in this case to provide the state inspection capabilities to traditional applications as well.…”
Section: Discussionmentioning
confidence: 99%
“…However, our experience shows that also the above applications can be ported to the proposed software architecture by using a mixture of bash scripting, monitoring of in‐kernel structures, and writing the equivalent of a wrapper ToY agent that implements the required northbound interface. For instance, in Bonafiglia et al, an iptables‐based VM was integrated within the overarching software architecture presented in this paper. In this respect, it is worth noticing that the mapping algorithms presented in Section have been used also in this case to provide the state inspection capabilities to traditional applications as well.…”
Section: Discussionmentioning
confidence: 99%
“…Most orchestration technologies working across administrative domains use a broker to orchestrate resources at different levels within a provider (e.g. the cloud and the edge network) and across providers (see [37] for a recent example). Broker models across providers and multi-stage schedulers and optimisers have been quite common in distributed computing and networking since at least 20 years ago [114].…”
Section: Multi -Organisation/-tenant Orchestrationmentioning
confidence: 99%
“…Recently, Bila et al [32] propose a policy-based improvement in the serverless architecture to guarantying and rebuilding vulnerable containers, that can be included as part of the security orchestration. Containers might have built-in vulnerabilities [48] Brokered (multi-domain) hierarchical orchestration [82,132,131,116,79,37] Service support in orchestration decisions[*] [113] Developer support in orchestration decisions("device in the loop") [*] [128,44] Self-protection, self-healing, self-repair, DoS protection [Security] [176,135,167,32] Universal identity management [dynamism, churn, larger-scale, multi-tenancy, privacy] [29] because of wrong configurations or just by the fact of including executable binaries with security flaws. In [154], authors propose a Security-as-a-Service approach for microservices-based cloud applications, providing a flexible monitoring and policy enforcement infrastructure for network traffic to secure cloud applications.…”
Section: Security and Privacymentioning
confidence: 99%
“…Network function virtualization (NFV) brings flexibility of network functions to be configured, migrated or terminated in optical networks. End-to-end network service orchestration can deploy network services over multiple network domains [1,22]. In the perspective of optical hardware, hardwareprogrammable network functions have been developed to deliver node functions in an on-demand way [14].…”
Section: Introductionmentioning
confidence: 99%