The Clean Sky fellows (PhD students) are all progressing steadily with their SDN-NFV topics. A majority of the works focus on optimizing different aspects of a future edge/fog computing environment. Among the topics presented (some by keynote speakers) this time was
- ClusPR: An algorithm for optimized placement of both flows and VNF in a topology
- Profiling the edge network: Work in progress to anonymized web-logs so that they may be applied for user interests analysis
- Multihop middle-box selection: New DNS record suggested to enable a client to influence how a chain of middle-boxes is to be composed
- NFV state migration: “Statelets” introduced (small state update packets) to enable close to seamless migration of a VFN.
- VNF placement in the edge-cloud: Network cost, processing cost with energy parameters are included in a placement algorithm. IoT is the target domain.
- Deploying distributed application: A VNF is just a high performance (low delay and/or high throughput) micro-service. Software developer need to supply quantitative information (from code profiling) to deployments engineers. New deployment templates suggested.
UNINETT is currently hosting one of the Clean Sky fellows and supporting him in his work on profiling user behavior to optimized data caching and computation in fog-computing contexts. Web server logs will (hopefully) be made available, after being anonymized, for profiling analysis (ref. pin 2 above).
NetSys 2017 presented work from a fairly broad range of networking research topics. “Single line” summaries of the more relevant presentations, seen from a backbone operators point of view, follows below.
- Sufian Hameed et al (NUCES) presented a light weight protocol which may utilize SDN equipment in multiple domains (ASes) to block DDoS attacks efficiently.
- Nicholas Gray et al (University of Würzburg) suggested a hot-standby regime for L4 firewalls.
- Robert Bauer et al (Karlsruhe Institute of Technology) showed how “flow load” distribution can be realized in an SDN network. A switch with full FIB may be offloaded by having entries moved to neighboring switches.
- Leonhard Nobach et al (Technische Universität Darmstadt) presented how the balance between applying FPGA or COTS hardware for NFV can be optimized.
- Keynote speaker Henning Schulzrinne ( Columbia University) emphasized that IoT expose all security deficiencies of the internet. There is currently little incentive for producers and consumers to change this, since none of them are directly affected when IoT devices are exploited for e.g. DDoS attacks. Large scale management (enrollment, updates, …) of IoT devices will be crucial in the future.
- Cristina Muñoz et al (University of Cambridge) explained how iterative bloom-filters may be applied to reduce FIB size in a named data network (or information centric network, ICN) node.
- Keynote speaker Wieland Holfelder (Google Germany GmbH) recommends Googles tensorflow.org project for machine learning.
- Keynote speaker Rolf Stadler (KTH) showed how a prediction engine can be trained to predict QoE-parameters from system KPI values only (e.g. from statistics in linux servers’s /proc or just statistics from network switches.)
- Claas Lorenz (genua GmbH) suggested how complex firewall rule sets may be analyses and verified efficiently.