{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T21:06:43Z","timestamp":1710364003132},"reference-count":32,"publisher":"Wiley","issue":"17","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Int J Communication"],"published-print":{"date-parts":[[2019,11,25]]},"abstract":"Summary<\/jats:title>Modern controllers for software\u2010defined networks (SDN) enable the execution of arbitrary SDN applications (eg, Network Address Translation (NAT), traffic monitors) that may be exploited by an overarching set of services (eg, application\u2010layer orchestrators) to build even richer services. To this purpose, the above overarching services require a mechanism that allows reading the run\u2010time state and writing the configuration of arbitrary SDN applications, possibly through a uniform API. Unfortunately, most SDN applications are not designed\/implemented by taking into account the possibility to be used as part of higher level service workflows (eg, a complex intrusion prevention system that leverages multiple elementary services as individual components), hence they may not provide an adequate interface that would allow overarching services to exploit their features. This paper addresses this problem by proposing an approach to represent the run\u2010time state of arbitrary applications, where data are exported according to high\u2010level model\u2010based structures. Furthermore, the mapping from the high\u2010level data model to the actual data representation within the SDN application is enabled by a suite of algorithms that are generic enough to operate independently of the actual source code of the application, thus avoiding undesired and invasive modifications to existing applications. The paper also presents a software framework and a prototype implementing the proposed approach, characterizes the resulting performance, and discusses pros and cons of the proposed approach.<\/jats:p>","DOI":"10.1002\/dac.3989","type":"journal-article","created":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T11:44:49Z","timestamp":1561981489000},"update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A model\u2010based abstraction layer for heterogeneous SDN applications"],"prefix":"10.1002","volume":"32","author":[{"given":"Gabriele","family":"Castellano","sequence":"first","affiliation":[{"name":"Department of Computer and Control Engineering Politecnico di Torino Torino Italy"}]},{"given":"Ivano","family":"Cerrato","sequence":"additional","affiliation":[{"name":"Department of Computer and Control Engineering Politecnico di Torino Torino Italy"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5206-1946","authenticated-orcid":false,"given":"Molka","family":"Gharbaoui","sequence":"additional","affiliation":[{"name":"Photonic Networks and Technologies National Laboratory National Inter\u2010University Consortium for Telecommunications (CNIT) Pisa Italy"}]},{"given":"Silvia","family":"Fichera","sequence":"additional","affiliation":[{"name":"TeCIP Institute Scuola Superiore Sant'Anna Pisa Italy"}]},{"given":"Barbara","family":"Martini","sequence":"additional","affiliation":[{"name":"Photonic Networks and Technologies National Laboratory National Inter\u2010University Consortium for Telecommunications (CNIT) Pisa Italy"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6134-7890","authenticated-orcid":false,"given":"Fulvio","family":"Risso","sequence":"additional","affiliation":[{"name":"Department of Computer and Control Engineering Politecnico di Torino Torino Italy"}]},{"given":"Piero","family":"Castoldi","sequence":"additional","affiliation":[{"name":"TeCIP Institute Scuola Superiore Sant'Anna Pisa Italy"},{"name":"Photonic Networks and Technologies National Laboratory National Inter\u2010University Consortium for Telecommunications (CNIT) Pisa Italy"}]}],"member":"311","published-online":{"date-parts":[[2019,7]]},"reference":[{"key":"e_1_2_10_2_1","unstructured":"ONOS \u2010 Open Network Operating System.http:\/\/onosproject.org\/"},{"key":"e_1_2_10_3_1","unstructured":"Open daylight.https:\/\/wiki.opendaylight.org\/"},{"key":"e_1_2_10_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6871676"},{"key":"e_1_2_10_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.04.010"},{"key":"e_1_2_10_6_1","unstructured":"Network configuration protocol (netconf).https:\/\/tools.ietf.org\/html\/rfc6241"},{"key":"e_1_2_10_7_1","unstructured":"BiermanA BjorklundM WatsenK.Restconf protocol. RFC 8040: RFC Editor;2017."},{"key":"e_1_2_10_8_1","unstructured":"YANG \u2010 a data modeling language for the network configuration protocol (netconf).https:\/\/tools.ietf.org\/html\/rfc6020"},{"key":"e_1_2_10_9_1","volume-title":"Restful web services","author":"Richardson L","year":"2007"},{"key":"e_1_2_10_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2602204.2602211"},{"key":"e_1_2_10_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"e_1_2_10_12_1","doi-asserted-by":"crossref","unstructured":"HanW HuH ZhaoZ et al.State\u2010aware network access management for software\u2010defined networks. In: Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies;Shanghai China;2016:1\u201011.","DOI":"10.1145\/2914642.2914643"},{"key":"e_1_2_10_13_1","unstructured":"Cisco network services orchestrator (nso) solutions.https:\/\/www.cisco.com\/c\/en\/us\/solutions\/service-provider\/solutions-cloud-providers\/network-services-orchestrator-solutions.html"},{"key":"e_1_2_10_14_1","first-page":"227","article-title":"Split\/merge: system support for elastic execution in virtual middleboxes.","volume":"13","author":"Rajagopalan S","year":"2013","journal-title":"NSDI"},{"key":"e_1_2_10_15_1","doi-asserted-by":"crossref","unstructured":"RajagopalanS WilliamsD JamjoomH.Pico replication: a high availability framework for middleboxes. In: Proceedings of the 4th annual Symposium on Cloud Computing ACM;2013;Santa Clara CA USA:1:1\u20101:15.","DOI":"10.1145\/2523616.2523635"},{"key":"e_1_2_10_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2626313"},{"key":"e_1_2_10_17_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi8020024"},{"key":"e_1_2_10_18_1","unstructured":"Selfnet.https:\/\/selfnet-5g.eu\/"},{"key":"e_1_2_10_19_1","doi-asserted-by":"crossref","unstructured":"ManzaliniA L\u00f3pezDR L\u00f8nsethagenH et al.A unifying operating platform for 5g end\u2010to\u2010end and multi\u2010layer orchestration. In: 2017 IEEE Conference on Network Softwarization Netsoft 2017;2017;Bologna Italy:1\u20105.","DOI":"10.1109\/NETSOFT.2017.8004216"},{"key":"e_1_2_10_20_1","doi-asserted-by":"crossref","unstructured":"PetersonL BakerS De\u00a0LeenheerM et al.Xos: an extensible cloud operating system. In: Proceedings of the 2nd International Workshop on Software\u2010Defined Ecosystems.ACM;2015;New York NY USA:23\u201030.","DOI":"10.1145\/2756594.2756598"},{"key":"e_1_2_10_21_1","unstructured":"TalebT KsentiniA FrangoudisPA.Follow\u2010me cloud: when cloud services follow mobile users. IEEE Transactions on Cloud Computing Special Issue on Mobile Cloud Vol.PP N\u00fd99 2016 ISSN: 2168\u20107161;2016."},{"key":"e_1_2_10_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1165389.945462"},{"key":"e_1_2_10_23_1","unstructured":"ETSI GSNFVMAN.Etsi mano.NFV-MAN\/001_099\/001\/01.01.01_60\/gs_NFV-MAN001v010101p.pdf"},{"key":"e_1_2_10_24_1","doi-asserted-by":"crossref","unstructured":"GharbaouiM FicheraS CastoldiP MartiniB.Network orchestrator for QoS\u2010enabled service function chaining in reliable NFV\/SDN infrastructure;2017;Bologna Italy:1\u20105.","DOI":"10.1109\/NETSOFT.2017.8004212"},{"key":"e_1_2_10_25_1","unstructured":"ClemmA VoitE PrietoA et al.Subscribing to yang datastore push updates. Internet\u2010Draft draft\u2010ietfnetconf\u2010 yang\u2010push\u201007: IETF Secretariat;2017."},{"key":"e_1_2_10_26_1","unstructured":"MalenfantJ JacquesM DemersFN.A tutorial on behavioral reflection and its implementation. In: Proceedings of the First International Conference Reflection '96 Vol.\u00a096;1996;San Francisco CA:1\u201020."},{"key":"e_1_2_10_27_1","doi-asserted-by":"crossref","unstructured":"MohammedAA GharbaouiM MartiniB PaganelliF CastoldiP.SDN controller for network\u2010aware adaptive orchestration in dynamic service chaining. In: 2016 IEEE NetSoft Conference and Workshops (NetSoft);2016;Seoul South Korea:126\u2010130.","DOI":"10.1109\/NETSOFT.2016.7502458"},{"key":"e_1_2_10_28_1","unstructured":"Sdn application ToY agent repository.https:\/\/github.com\/netgroup-polito\/sdn-app-toy-agent"},{"key":"e_1_2_10_29_1","doi-asserted-by":"crossref","unstructured":"TjhaiG PapadakiM FurnellS ClarkeN.Investigating the problem of ids false alarms: an experimental study using snort. In: Proceedings of The Ifip Tc 11 23rd International Information Security Conference. SEC 2008. IFIP\u00a0\u2013\u00a0The International Federation for Information Processing Vol.\u00a0278;2008;Milano Italy:253\u2010267.","DOI":"10.1007\/978-0-387-09699-5_17"},{"key":"e_1_2_10_30_1","doi-asserted-by":"crossref","unstructured":"GharbaouiM ContoliC DavoliG et al.Experimenting latency\u2010aware and reliable service chaining in next generation internet testbed facility. In: Proceedings of IEEE NFV\u2010SDN;2018;Verona Italy:1\u20104.","DOI":"10.1109\/NFV-SDN.2018.8725783"},{"key":"e_1_2_10_31_1","volume-title":"Java Reflection in Action","author":"Forman IR","year":"2004"},{"key":"e_1_2_10_32_1","unstructured":"Frog configurable VNF repository.https:\/\/github.com\/netgroup-polito\/frog4-configurable-vnf"},{"key":"e_1_2_10_33_1","doi-asserted-by":"crossref","unstructured":"BonafigliaR CastellanoG CerratoI RissoF.End\u2010to\u2010end service orchestration across SDN and cloud computing domains. In: 2017 IEEE Conference on Network Softwarization (NetSoft);2017;Bologna Italy:1\u20106.","DOI":"10.1109\/NETSOFT.2017.8004234"}],"container-title":["International Journal of Communication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fdac.3989","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/dac.3989","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,8]],"date-time":"2023-09-08T19:15:32Z","timestamp":1694200532000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/dac.3989"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":32,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2019,11,25]]}},"alternative-id":["10.1002\/dac.3989"],"URL":"https:\/\/doi.org\/10.1002\/dac.3989","archive":["Portico"],"relation":{},"ISSN":["1074-5351","1099-1131"],"issn-type":[{"value":"1074-5351","type":"print"},{"value":"1099-1131","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7]]},"assertion":[{"value":"2018-05-15","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-12-13","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}