Page 66 - Kaleidoscope Academic Conference Proceedings 2022
P. 66

2022 ITU Kaleidoscope Academic Conference




           To enable adaptive behavior, and thus realize self-driving   as well as the east-west  bound  interface for decentralized
           networks, management and control planes require    controller settings, have not reached adequate maturity levels.
           decentralization so that relevant functions can execute very   In a parallel effort, the P4 language [4] addresses a more
           close to the infrastructure (if not in it) and  base their   general problem than OpenFlow and has been designed to
           decisions on local knowledge. Such a setting would allow the   program the behavior of the forwarding plane irrespective of
           timely detection of events that adversely affect the service   the supported network protocol and the type of controller.
           performance, and the swift computation and enforcement of
           appropriate remedy actions, for example rerouting through   Although P4 has gained  traction in the networking
           an alternative path or selecting another server hosting an   community, the language is fairly low level and therefore
           application instance. In addition, to warrant the performance   somewhat  complex even for simple packet  processing
           of demanding services delivered  over large network   operations. We believe that simpler approaches are needed,
           infrastructures, real-time telemetry is needed so that an   which do not necessarily require expert knowledge on the
           accurate view of the resources can be constantly maintained.   underlying networking technologies. The abstraction level at
           The vast amount of collected information can overwhelm   which  the resources  are programmed should  be raised.
           network management systems, hence efficient mechanisms   Instead of composing  code  that details ’how’ a  goal is
           are needed that can dynamically self-tune and achieve the   achieved, directives are used to define ’what’ needs to be
           right trade-off between accuracy and overhead [22], [23].   achieved. Alongside a declarative approach for expressing
                                                              the desired network behavior, a mechanism is needed that
           2.2   High-level programmability                   automatically decomposes high-level  goals to specific
                                                              configuration settings, thus allowing the network to flexibly
           Network programmability  has always been a challenging   adapt to changes in business objectives, administrative goals,
           issue with solutions traditionally involving complex low-  and application requirements. Research on  intent-based
           level  scripts and multiple vendor-specific interfaces, thus   networking [6], [25]  has taken some initial steps  in this
           making desired changes in the behavior of network devices   direction, but a concrete language and  decomposition
           a  daunting  task.  Programmability  has  been  a  topic  of   solutions have not been made available yet.
           discussion since the late 90s with proposals on open APIs
           [14] and  active  networks  [3],  [24].  While  the  idea  of  3.  CLOUD NATIVE NETWORKING
           programming control information in headers that defines the
           treatment of  packets in the network  initially seemed  Cloud computing has brought enormous advantages in terms
           promising, it was eventually dismissed on the  grounds of  of elasticity, scalability,  and automation in computational
           significant security risks.                        and storage infrastructure. However, large cloud providers
                                                              tend to  be based around a  handful of large data centers
           In an effort to reduce the network administration complexity,   strategically positioned at central locations on the Internet.
           the policy-based management technology [21] was    Users are, therefore, often located hundreds or thousands of
           extensively researched around the same time, in which   kilometers away from the computational nodes hosting the
           policies  govern the network behavior  offering a certain   services they are  accessing.  This  implies  network  and
           degree of  programmability. These are  technology-  processing latencies in the order of hundreds up to thousands
           independent rules that enhance the functionality of network   of milliseconds for  many users in addition to the
           devices by introducing  interpreted logic that can  be   inefficiencies and cost implications of transferring data over
           dynamically  changed  without  modifying  the  underlying   large distances and long network paths in the case of data-
           implementation.  Alongside  the  core  PBM  technologies,   intensive applications. This also has additional non-technical
           techniques to refine high-level goals to  concrete   disadvantages such  as data being stored and processed in
           configuration parameters had been developed at the time [2],   regions under different jurisdictions to those where the users
           [16]. These, however, were not fully automated and were   are located. In terms of security and  privacy, the
           also based on application-specific policy refinement patterns,  concentration of clouds in a few central locations turns them
           which limited their applicability to specific domains,  e.g.   into easier targets for (cyber and  physical) attacks and
           quality of service and security. Another issue concerned the   facilitates surveillance taps into the  fiber optic  links
           possibility of configuration inconsistencies as a result of   interconnecting data centers.
           policy conflicts [5].
                                                              The above issues drove research in academia and industry to
           More recently, the decoupling of the control plane from the   investigate distributed deployments of a vast array of
           forwarding hardware in the Software-Defined Networking   computational resources in the vicinity of both the users and
           (SDN)  paradigm  [12] empowers operators with a highly   data sources [18], [20]. Based on the flexibility concerning,
           flexible  approach to control  the behavior of the network,   for example, the locations at which applications execute and
           since control functions/policies (realized in soft form) can be   the selection of nodes from where user requests are served,
           easily added and removed. While the southbound interface   the edge compute paradigm envisions an environment where
           of the SDN  architecture, i.e. OpenFlow,  has undergone   services can be accessed with a much lower latency, while at
           several iterations and allows us to define the treatment of   the same time reducing the traffic footprint on the network
           traffic in switches, the northbound interface that supports the   and enabling better resilience to failures and attacks.
           interaction between the controller and external applications,





                                                          – 20 –
   61   62   63   64   65   66   67   68   69   70   71