Visible to the public Toward Content-Oriented Orchestration: SDN and NFV as Enabling Technologies for NDN

TitleToward Content-Oriented Orchestration: SDN and NFV as Enabling Technologies for NDN
Publication TypeConference Paper
Year of Publication2019
AuthorsMai, Hoang Long, Aouadj, Messaoud, Doyen, Guillaume, Mallouli, Wissam, de Oca, Edgardo Montes, Festor, Olivier
Conference Name2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)
Date Publishedapr
Keywordscommodity hardware, Computer architecture, computer network security, content-oriented orchestration, Information Centric Network, Information Centric Networks, information-centric networking paradigm, Internet, MANO, named data networking, NDN, NDN virtual network, NDN-related security, network function virtualization, network operators, NFV, orchestration, Peer-to-peer computing, Performance, Protocols, pubcrawl, resilience, Resiliency, Scalability, SDN, security, software defined networking, Standards, Topology, TOSCA standard, virtualisation
AbstractNetwork Function Virtualization (NFV) is a novel paradigm which enables the deployment of network functions on commodity hardware. As such, it also stands for a deployment en-abler for any novel networking function or networking paradigm such as Named Data Networking (NDN), the most promising solution relying on the Information-Centric Networking (ICN) paradigm. However, dedicated solutions for the security and performance orchestration of such an emerging paradigm are still lacking thus preventing its adoption by network operators. In this paper, we propose a first step toward a content-oriented orchestration whose purpose is to deploy, manage and secure an NDN virtual network. We present the way we leverage the TOSCA standard, using a crafted NDN oriented extension to enable the specification of both deployment and operational behavior requirements of NDN services. We also highlight NDN-related security and performance policies to produce counter-measures against anomalies that can either come from attacks or performance incidents.
Citation Keymai_toward_2019