2014 Third European Workshop on Software Defined Networks 2014
DOI: 10.1109/ewsdn.2014.14
|View full text |Cite
|
Sign up to set email alerts
|

Position Paper: Software-Defined Network Service Chaining

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
37
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 52 publications
(39 citation statements)
references
References 6 publications
0
37
0
Order By: Relevance
“…18 Unlike OpenFlow or Onix, OE is an end-to-end communication frame- 19 work for the access, metro and core networks. The OE approach ex-20 tends the advancements of Carrier Ethernet and Software Defined Net- 21 working (SDN) [26,27] for end-to-end communication through a cen-22 tralized management entity. 23 As defined by SDN [22,28], the centralized software entity (termed 24 as "controller") maintains communication channels with the net- 25 working devices.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…18 Unlike OpenFlow or Onix, OE is an end-to-end communication frame- 19 work for the access, metro and core networks. The OE approach ex-20 tends the advancements of Carrier Ethernet and Software Defined Net- 21 working (SDN) [26,27] for end-to-end communication through a cen-22 tralized management entity. 23 As defined by SDN [22,28], the centralized software entity (termed 24 as "controller") maintains communication channels with the net- 25 working devices.…”
Section: Introductionmentioning
confidence: 99%
“…23 As defined by SDN [22,28], the centralized software entity (termed 24 as "controller") maintains communication channels with the net- 25 working devices. It also fetches device/link-level events to create a 26 global state of the network, such as network topology, link utiliza- 27 tions, failure conditions and many others. Updated information re- 28 garding the global state of the network is essential for the efficiency 29 of complex control and management tasks such as traffic engineer- 30 ing, resource reservations, failure detection and recovery as well as 31 policy-based service provisioning [19,20].…”
Section: Introductionmentioning
confidence: 99%
“…Our formulation is as follows. Equation (8) guarantees that an instance must be placed on exactly one service node; (9) constrains the fact that resource demands of all instances placed on a service node should be less than or equal to available resources in that node; (10) and (11) ensure that physical locations of the source and destination of a flow are respected, respectively; (12) constrains decision variables to be 0 or 1. For the sake of clarify, we denote (3) and (7) as 1 ( ) and 2 ( ), where = ( ) | sr + end |×| ins + end | .…”
Section: Formulationmentioning
confidence: 99%
“…Generally, an SSC is derived from the security request of individual user or application. An instance is an operational software or hardware instance capable of delivering the treatment specified by the associated security function to packets or flows [11]. We only consider software instances, namely, virtualized security functions (e.g., virtual firewall, IPS, Web filter, and virus scanner).…”
Section: Introductionmentioning
confidence: 99%
“…Blendin et al [4], exploit Linux namespaces to create isolated service instances per service chain, allowing one-to-one mapping of users to service instances. Network Service Headers (NSH) [5] is another approach that involves the introduction of SFC-specific 4-byte headers that include all the information needed (including associated metadata) to reach a policy decision with regard to what service chain the traffic should follow.…”
Section: Related Workmentioning
confidence: 99%