Application Policy on Network Functions (APONF) G. Karagiannis and T.Tsou 1.

Slides:



Advertisements
Similar presentations
1 IETF KEYPROV WG Protocol Basis and Characteristics IEEE P April 11, 2007 Andrea Doherty.
Advertisements

Doc.: IEEE /0046r0 Submission July 2009 Ari Ahtiainen, NokiaSlide 1 A Cooperation Mechanism for Coexistence between Secondary User Networks on.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Omniran TG 1 Cooperation for OmniRAN P802.1CF Max Riegel, NSN (Chair OmniRAN TG)
Current impacts of cloud migration on broadband network operations and businesses David Sterling Partner, i 3 m 3 Solutions.
SCENARIO Suppose the presenter wants the students to access a file Supply Credenti -als Grant Access Is it efficient? How can we make this negotiation.
Clouds C. Vuerli Contributed by Zsolt Nemeth. As it started.
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Service Layer Session Management Group Name: WG2-ARC Source: IDCC, LGE, ZTE Meeting Date: TP16 Agenda Item:
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
OSD Metadata Management
EUROPEAN UNION Polish Infrastructure for Supporting Computational Science in the European Research Space User Oriented Provisioning of Secure Virtualized.
NFVRG Dallas Verification of NFV Services : Problem Statement and Challenges draft-shin-nfvrg-service-verification-01 M-K. Shin, ETRI.
1 Attribute Based Communications University of California, Irvine Presented By : Ala Khalifeh (Note: Presented)
Cloud Usability Framework
Configuration Management
A Survey on Interfaces to Network Security
5205 – IT Service Delivery and Support
Public Key Infrastructure Ammar Hasayen ….
Omniran OmniRAN Wi-Fi Hotspot Roaming Use Case Date: Authors: NameAffiliationPhone Max RiegelNSN
Bootstrapping Key Infrastructures Max Pritikin IETF 91, 10 Nov 2014 Aloha!
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
Introduction To Windows Azure Cloud
HIPAA COMPLIANCE WITH DELL
Use Case for Distributed Data Center in SUPA
On P2P Collaboration Infrastructures Manfred Hauswirth, Ivana Podnar, Stefan Decker Infrastructure for Collaborative Enterprise, th IEEE International.
Presented by Xiaoyu Qin Virtualized Access Control & Firewall Virtualization.
The Data Grid: Towards an Architecture for the Distributed Management and Analysis of Large Scientific Dataset Caitlin Minteer & Kelly Clynes.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
Considerations on M2M URIs Group Name: WG2(ARC) Source: Yong-Suk Park, Sung-Chan Choi, Jaeho Kim, KETI, Meeting Date:
Simulation of the OLSRv2 Protocol First Report Presentation.
Secure Systems Research Group - FAU SW Development methodology using patterns and model checking 8/13/2009 Maha B Abbey PhD Candidate.
03/20/10Plug-and-Play Deployment of Network Devices Tina TSOU Juergen Schoenwaelder
Software Requirements: A More Rigorous Look 1. Features and Use Cases at a High Level of Abstraction  Helps to better understand the main characteristics.
Enabling the Future Service-Oriented Internet (EFSOI 2008) Supporting end-to-end resource virtualization for Web 2.0 applications using Service Oriented.
Hierarchical Topology Design. 2 Topology Design Topology is a map of an___________ that indicates network segments, interconnection points, and user communities.
Using Routing and Remote Access Chapter Five. Exam Objectives in this Chapter:  Plan a routing strategy Identify routing protocols to use in a specified.
SelfCon Foil no 1 Variability in Self-Adaptive Systems.
Omniran IEEE 802 Scope of OmniRAN Date: Authors: NameAffiliationPhone Max RiegelNSN
© Drexel University Software Engineering Research Group (SERG) 1 The OASIS SOA Reference Model Brian Mitchell.
NFV Configuration Problem Statements Haibin Song Georgios Karagiannis
Cyber in the Cloud & Network Enabling Offense and Defense Mark Odell April 28, 2015.
Company LOGO Network Architecture By Dr. Shadi Masadeh 1.
ForCES Forwarding Element Functional Model Lily Yang, Joel Halpern, Ram Gopal, Ram Dantu.
1 st EGI CTA VT meeting 18 January 2013 C. Vuerli (INAF, Italy), N. Neyroud (CNRS/IN2P3/LAPP, France)
Presented by: Sonali Pagade Nibha Dhagat paper1.pdf.
Omniran IEEE 802 Scope of OmniRAN Date: Authors: NameAffiliationPhone Max RiegelNSN
Draft-li-idr-cc-bgp-arch-00IETF 88 IDR1 An Architecture of Central Controlled Border Gateway Protocol (BGP) draft-li-idr-cc-bgp-arch-00 Zhenbin Li, Mach.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
INDIGO – DataCloud Security and Authorization in WP5 INFN RIA
Doc.: IEEE /0085r1 Submission June 2010 Tuncer Baykas, NICTSlide TG1 and System Design Document Notice: This document has been prepared.
Tunis, Tunisia, 28 April 2014 Requirements of network virtualization for Future Networks Nozomu Nishinaga New Generation Network Laboratory Network Research.
Issues in Cloud Computing. Agenda Issues in Inter-cloud, environments  QoS, Monitoirng Load balancing  Dynamic configuration  Resource optimization.
SDN challenges Deployment challenges
Using E-Business Suite Attachments
StratusLab Final Periodic Review
StratusLab Final Periodic Review
Federated IdM Across Heterogeneous Clouding Environment
Framework of Network Virtualization for Future Networks
SUPA/YMCA (Yang Models for Configuration and topology Abstraction)
Management and Orchestration in Complex and Dynamic Environment
UDP based Publication Channel for Streaming Telemetry
P802.11aq Waiver Request Additional Information
Analysis models and design models
Network Architecture By Dr. Shadi Masadeh 1.
TG1 and System Design Document
Presentation transcript:

Application Policy on Network Functions (APONF) G. Karagiannis and T.Tsou 1

APONF Problem Description (1)  Cloud applications, cloud tenants and developers usually need to use communication network capabilities, e.g., dynamic network management, easily, accurately and efficiently  deployment of new applications and services may be accelerated and user experience can be improved  Network operators are challenged to create an abstract view of network infrastructure and help service developers on using and programming this abstraction 2

APONF Problem Description (2) Challenges (1)  Abstract view of a network infrastructure need to be realized using e.g., a network service graph that includes network service attributes, e.g.,:  Service dependencies, network configuration and topology  Application based policies  For each network management application (OSS application like) instance an unique network service graph needs to be generated and maintained 3

APONF Problem Description (3) Challenges (2)  Up to date (fresh) network service graph needs to be communicated between network management application systems and network management and controlling systems 4

APONF Problem Description (4) Challenges (3)  Attributes, including application based policies, of network service graph need to be mapped into specific network management policies 5

APONF Goal  APONF can provide solutions to these challenges by:  Model network service graph, which among others include application based policies, using Yang  Use Netconf to enable the dissemination of up to date (fresh) network service graphs in a secure and efficient manner between network management application systems and network management and controlling systems  Guidelines on mapping attributes of network service graphs provided by network management application systems into specific network management policies 6

7

APONF Work Items specify network service graph based on Yang models that represents abstract view of network infrastructure specify how Netconf/Yang can be used to securely and efficiently distribute up to date (fresh) network service graphs between network management applications and network management systems, the routing controlling system or other controlling systems specify mechanisms that can dynamically map attributes, including application based policies, of network service graphs into specific network management policies document how to use Netconf authentication and authorization mechanisms to achieve protection and isolation 8

APONF Non Work Items specification of the network management policies and their associated device configuration models 9