The possibility to deploy telecommunication services based on the availability of a fully flow-aware network is an appealing possibility. Concepts like Network Service Chaining and Network Function Virtualization expect the information to be manageable at the flow level. But, for this concept to be available for the development of user-centric applications, the access network should also be made flow-aware. In this paper we present the integration of a legacy DOCSIS based access network under an OpenFlow Control Framework by using the Hardware Abstraction Layer designed in the FP7 ALIEN project.
The result is a dynamic wide area OpenFlow switch that spawns from the aggregation switch to the home equipment and hides all the complexity (including the provisioning) of the access technology to an unmodified and standard OpenFlow controller. As a result, the access network can react not only to any kind of user traffic but also to the connection of CPE to the network. The approach used is technology independent, and the results have been successfully demonstrated over a Cisco based DOCSIS access network.
Type:
Conference proceedings book
Book title:
Proceedings of the European Workshop on Software Defined Networks EWSDN 2014
This paper presents FlowNAC, a Flow-based Network Access Control solution that allows to grant users the rights to access the network depending on the target service requested. Each service, defined univocally as a set of flows, can be independently requested and multiple services can be authorized simultaneously. Building this proposal over SDN principles has several benefits: SDN adds the appropriate granularity (fine- or coarse-grained) depending on the target scenario and flexibility to dynamically identify the services at data plane as a set of flows to enforce the adequate policy.
FlowNAC uses a modified version of IEEE 802.1X (novel EAPoL-in-EAPoL encapsulation) to authenticate the users (without the need of a captive portal) and service level access control based on proactive deployment of flows (instead of reactive). Explicit service request avoids misidentifying the target service, as it could happen by analyzing the traffic (e.g. private services). The proposal is evaluated in a challenging scenario (concurrent authentication and authorization processes) with promising results.
Type:
Conference proceedings book
Book title:
Proceedings of the European Workshop on Software Defined Networks EWSDN 2014
Journal:
IEEE Computer Society
Hardware Abstraction Layer as an SDN-enabler for non- OpenFlow network equipment
This paper describes an experimentally-tested approach towards programmability for legacy network elements in the software-defined networking architecture.
As OpenFlow is a leading control-plane protocol enabling SDN in modern networks, yet not all equipment is compatible with this framework. This problem is addressed in ALIEN, the FP7 research project, where Hardware Abstraction Layer (HAL) for non-OpenFlow capable devices is introduced. This paper describes outcomes of the project, and specifically, gives a set of examples of the successful implementation of OpenFlow through the HAL on ‘alien’ devices.
Type:
Conference proceedings book
Book title:
Proceedings of the European Workshop on Software Defined Networks EWSDN 2014
Journal:
IEEE Computer Society
Leading the OFELIA Facility Beyond OpenFlow 1.0 Experimentations
Nowadays, several devices supporting OpenFlow versions beyond 1.0 are available on the market.
However, existent OpenFlow testbeds like OFELIA do not provide support for such devices, therefore it is hard for the research community to explore and test the newest functionalities of the protocol in realistic environments. This paper gives a short overview of two different architectures investigated within the FP7 ALIEN project that both aim to overcome this limitation within the OFELIA experimental facility.
Type:
Conference proceedings book
Book title:
Proceedings of the European Workshop on Software Defined Networks EWSDN 2014
Journal:
IEEE Computer Society
Towards Unified Programmability of Cloud and Carrier Infrastructure
The rise of cloud services poses considerable challenges on the control of both cloud and carrier network infrastructures.
While traditional telecom network services rely on rather static processes (often involving manual steps), the wide adoption of mobile devices including tablets, smartphones and wearables introduce previously unseen dynamics in the creation, scaling and withdrawal of new services. These phenomena require optimal flexibility in the characterization of services, as well as on the control and orchestration of both carrier and cloud infrastructure. This paper proposes a unified programmability framework addressing: the unification of network and cloud resources, the integrated control and management of cloud and network, the description for programming networked/cloud services, and the provisioning processes of these services. In addition proofs-of-concept are provided based on existing opensource control software components.
Type:
Conference proceedings book
Book title:
Proceedings of the European Workshop on Software Defined Networks EWSDN 2014
Journal:
IEEE Computer Society
We would like to use cookies to improve our website
By allowing us to use cookies to gather statistics, you will help us to make our website even better.
- how we use cookies, - the types of cookies we
use, - for how long they work and for what purposes they are used, - how to change your cookie settings
and opt-out, and - Who are we and how can you contact us.
When we use words like “us”, “we”, “our” we mean I2T Research Group. You can find our company details below.
We are the data controller of the data collected through the use of cookies on our website.
Our website is https://i2t.ehu.eus, incl. our sub-domains,
we own and operate.
When we refer to “you” we mean you as a user or visitor of our website.
This policy is part of our privacy policy. Our use of cookies may include processing of your personal
data and we therefore recommend that you read our privacy policy, which can be found here “Privacy policy”.
Consent
By accepting our use of cookies, apart from necessary cookies, you consent to our use of cookies as
described under "Types of cookies and how we use them" below. You may at any time change or withdraw your cookie
consent - See the section “How you can change your cookie settings, incl. opting out” below.
What do I need to know about cookies?
There are different types of cookies and they are used for different purposes.
Below you can read about what a cookie is, the difference between first and third party cookies and
session cookies vs. persistent cookies and what types of cookies we use on our website and why.
What is a cookie?
A cookie is a small piece of data that a website stores on your device when you visit it and which is
then read when you later revisit the site. The word "cookies" in this policy and the consent also refers to
other forms of automatic collection of data, e.g. Flash-cookies (Local Shared Objects), Web Storage (HTML5),
Javascripts or cookies placed by other software.
A cookie may contain information about the website itself, a unique identifier that allows the site to
recognise your web browser when you return to the website, additional data that serves the purpose of the
cookie, and the lifespan of the cookie itself.
The word "cookies" or "cookie data" also covers information about IP and MAC addresses and other
information about your device collected by said technologies.
Cookies are used to enable certain features (e.g. logging in), to track site usage (e.g. analytics), to
store your user settings (e.g. timezone, notification preferences), and to personalise your content (e.g.
advertising, language).
Session cookies vs. persistent cookies
Session cookies only last as long as your online session. This means that they will disappear from your
computer or device when you close your browser. They are therefore also sometimes referred to as temporary
cookies. Typically, session cookies are used to remember what a user put in their basket when they are browsing
a website.
Persistent cookies are different. These cookies are sometimes called permanent cookies. They will
stay on your computer or device after you close your browser. These types of cookies will expire according to
the time specified in the cookie. You can see the specific duration of each persistent cookie below.
What’s the difference between first and third party cookies?
First party cookies are cookies that are set by the website that you are visiting and it's only this
website that can access and read these cookies.
Third party cookies are set by someone other than the owner of the website you’re visiting. As an
example, some pages have content from other sites like YouTube. YouTube may set their own cookies on your
browser when you play the video from YouTube. Cookies set by other sites and companies (i.e. third parties) can
be used to track you on other websites that use the same third-party service.
We may engage third parties to assist with maintenance, operation, creation or functionality of our
website, e.g. analytics providers and content partners. We grant these third parties’ access to selected
information to perform specific tasks on our behalf.
We are, as a general rule, joint controller with providers of third-party cookies for the collection of
personal data via such cookies and the disclosure to the provider. The provider of third-party cookies is data
controller for the processing taking place after receiving the personal data from us. You can read more about
the extent of our joint controllership with providers of third-party cookies in our privacy policy.
We recommend reading the provider's privacy policy which can be found through links in the tables
below, where you can also see which cookies on our website are first party cookies and third-party cookies.
Pixels
Cookies are not the only way to recognise or track visitors to a website. We may use other,
similar technologies from time to time, like web beacons (sometimes called "tracking pixels" or "clear gifs").
These are tiny graphics files that contain a unique identifier that enable us to recognise when someone
has visited our website or opened an email that we have sent them. This allows us, for example, to monitor
the traffic patterns of users from one page within our website to another, to understand whether you have come
to our website from an online advertisement displayed on a third-party website, to improve site performance, and
to measure the success of email marketing campaigns.
How you can change your cookie settings, incl. opting out
As part of our cookie solution, we always ask for your consent to cookies, except for necessary
cookies, before placing cookies on your device.
We also always give you the option to change your consent. If you at one point gave consent to
non-necessary cookies on our website, you can always change which cookies you will give consent to. Just look
for the shield on our website. If you press the shield, your cookie settings will appear, allowing you to always
change your settings and reject cookies.
It's also possible to instruct your browser to refuse cookies from our website. Most browsers are
configured to accept cookies by default, but you can update these settings to either refuse cookies altogether,
or to notify you when a website is trying to set or update a cookie. If you use multiple browsers and wish to
block cookies or change or withdraw your consent, remember to do this in all browsers.
If you browse websites from multiple devices, you may also need to update your settings on each
individual device.
Although some cookies can be blocked with little impact on your experience of a website, blocking
all cookies may mean you are unable to access certain features and content on the site.
How often will we update this Cookie Notice?
We may update this Cookie Policy from time to time in order to reflect, for example, changes to
the cookies we use or for other operational, legal or regulatory reasons. Please therefore re-visit this
Cookie Policy regularly to stay informed about our use of cookies and related technologies. The date at
the bottom of this Cookie Policy indicates when it was last updated.
Who are we and how can you contact us?
Here is our company information:
I2T Research Group ETSIB de Bilbao (UPV / EHU) Alameda Urquijo s/n 48013, Bilbao - Bizkaia Spain
This policy is effective from Sunday 8 November 2020
Necessary cookies
Necessary cookies help with the basic functionality of our website, e.g. remember if you gave consent to cookies.
Which cookie providers are we using for necessary purposes?
i2t research group
Cookie name
Expiration
i2t_research_group_session
120 days
eu_cookie_consent
183 days
X-CSRF-TOKEN
2 hours
X-XSRF-TOKEN
2 hours
Analytical cookies
Analytical cookies make it possible to gather statistics about the use and traffic on our website, so we can make it better.
Which cookie providers are we using for analytical purposes?
Google Analytics
Google Analytics es una herramienta sencilla y fácil de usar que ayuda a los propietarios de sitios web a medir la forma en que los usuarios interactúan con el contenido del sitio web. A medida que un usuario navega entre páginas web, Google Analytics proporciona a los propietarios de los sitios web etiquetas JavaScript (bibliotecas) para registrar información sobre la página que ha visto un usuario, por ejemplo, la URL de la página. Las bibliotecas de JavaScript de Google Analytics utilizan cookies HTTP para "recordar" lo que un usuario ha hecho en páginas anteriores o en interacciones con el sitio web.
Cookie name
Expiration
_gat
Session
_ga
306 days
_gid
162 days
Marketing cookies
By allowing us to use marketing cookies we’ll be able to show you relevant offers and ads across different websites.