Clemm / Wolter | Network-Embedded Management and Applications | E-Book | www2.sack.de
E-Book

E-Book, Englisch, 354 Seiten

Clemm / Wolter Network-Embedded Management and Applications

Understanding Programmable Networking Infrastructure
1. Auflage 2012
ISBN: 978-1-4419-6769-5
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark

Understanding Programmable Networking Infrastructure

E-Book, Englisch, 354 Seiten

ISBN: 978-1-4419-6769-5
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark



Despite the explosion of networking services and applications in the past decades, the basic technological underpinnings of the Internet have remained largely unchanged.  At its heart are special-purpose appliances that connect us to the digital world, commonly known as switches and routers.  Now, however, the traditional framework is being increasingly challenged by new methods that are jostling for a position in the 'next-generation' Internet.  The concept of a network that is becoming more programmable is one of the aspects that are taking center stage.  This opens new possibilities to embed software applications inside the network itself and to manage networks and communications services with unprecedented ease and efficiency.   In this edited volume, distinguished experts take the reader on a tour of different facets of programmable network infrastructure and applications that exploit it.  Presenting the state of the art in network embedded management and applications and programmable network infrastructure, the book conveys fundamental concepts and provides a glimpse into various facets of the latest technology in the field. 

Clemm / Wolter Network-Embedded Management and Applications jetzt bestellen!

Weitere Infos & Material


1;Preface;6
2;Contents;10
3;Part1: Foundations of Network-Embedded Management and Applications;12
3.1;Chapter 1: Motivation: The Dawn of the Age of Network-Embedded Applications;13
3.1.1;1.1 Introduction: What Are Network-Embedded Applications?;13
3.1.2;1.2 Network-Embedded Versus Network-Attached;15
3.1.2.1;1.2.1 Central Management;15
3.1.2.2;1.2.2 Distributed Management;15
3.1.2.3;1.2.3 Network-Attached;16
3.1.2.3.1;1.2.3.1 Load Balancers;17
3.1.2.3.2;1.2.3.2 Set-Top Box (STB);17
3.1.2.4;1.2.4 Network-Embedded;17
3.1.3;1.3 Opportunities: Network-Embedded Application Scenarios;20
3.1.3.1;1.3.1 Industry Initiatives;24
3.1.4;1.4 Business Considerations;25
3.1.5;1.5 Technical Challenges and Future Opportunities;26
3.1.5.1;1.5.1 Technical Challenges;26
3.1.5.2;1.5.2 Future Opportunities;27
3.1.5.3;1.5.3 Where Do We Stand?;29
3.1.6;References;30
3.2;Chapter 2: A Brief History of Network Programmability and Related Fields;32
3.2.1;2.1 Introduction to Network Programmability;32
3.2.2;2.2 Routing;32
3.2.2.1;2.2.1 Advanced Routing Protocols;33
3.2.2.2;2.2.2 Routing in Mobile Environments;34
3.2.2.3;2.2.3 Quality of Service;35
3.2.2.4;2.2.4 Embedded Monitoring;36
3.2.2.5;2.2.5 Embedded Programmability;40
3.2.2.6;2.2.6 Programmable Hardware;41
3.2.2.7;2.2.7 Zero Con guration;41
3.2.2.8;2.2.8 Service Discovery;42
3.2.3;2.3 Management by Delegation;44
3.2.4;2.4 Policy-Based Networking;45
3.2.4.1;2.4.1 Integrated Services;45
3.2.4.2;2.4.2 Differentiated Services;46
3.2.4.3;2.4.3 Common Open Policy Service (COPS);47
3.2.4.4;2.4.4 OpenFlow;49
3.2.5;2.5 Middleware and Web Services;50
3.2.5.1;2.5.1 Middleware;50
3.2.5.2;2.5.2 Service-Oriented Architecture (SOA) and Web Services;51
3.2.5.2.1;2.5.2.1 SOA;51
3.2.5.2.2;2.5.2.2 Web Services;52
3.2.6;2.6 Autonomic Computing and Self-Management;52
3.2.7;2.7 Peer-to-Peer Networking and DHTs;55
3.2.7.1;2.7.1 Peer-to-Peer Networking;55
3.2.7.2;2.7.2 Hash Tables and Distributed Hash Tables (DHT);55
3.2.8;2.8 Network Virtualization and Cloud Computing;57
3.2.8.1;2.8.1 Grid Computing;58
3.2.8.2;2.8.2 Cloud Computing;59
3.2.8.3;2.8.3 Embedded Cloud Versus Over-the-Top (OTT) Services;61
3.2.9;2.9 Conclusion;62
3.2.10;References;63
3.3;Chapter 3: Network-Embedded Management*;67
3.3.1;3.1 Embedded Management Drivers;69
3.3.1.1;3.1.1 Total Cost of Ownership (TCO);69
3.3.1.2;3.1.2 Reduction in Required Expertise;70
3.3.1.3;3.1.3 Greater Network Resilience;71
3.3.1.4;3.1.4 Reduced Dependency on External System Support;71
3.3.2;3.2 Migrating Management Functionality into the Network;72
3.3.2.1;3.2.1 Autonomic Systems;73
3.3.2.2;3.2.2 Understanding Autonomic System Limitations;74
3.3.3;3.3 Network-Embedded Management Implementation;76
3.3.4;3.4 The Evolution of Network-Embedded Management Capabilities;78
3.3.4.1;3.4.1 Management Content;78
3.3.4.2;3.4.2 Communication Pattern Ef ciency;80
3.3.4.3;3.4.3 Adaptiveness;82
3.3.4.4;3.4.4 Autonomy;84
3.3.4.5;3.4.5 Closing Remarks;85
3.3.5;References;85
3.4;Chapter 4: Improving Manageability Through Network-Embedded Management;87
3.4.1;4.1 Management Interfaces;88
3.4.1.1;4.1.1 Completeness;88
3.4.1.2;4.1.2 Consistency;92
3.4.1.3;4.1.3 Ef ciency;95
3.4.2;4.2 Embedded Management Intelligence;100
3.4.2.1;4.2.1 Migrating Management Functionality into the Network;101
3.4.2.2;4.2.2 Other Management Support Functions;104
3.4.3;References;106
4;Part2: (Invited Chapters) Infrastructure, Case Studies, Research Areas;107
4.1;Chapter 5: On the Relevance and Adoption of Network Automation;108
4.1.1;5.1 Introduction;108
4.1.2;5.2 Rapid Diffusion at a Price;109
4.1.3;5.3 A Unique Moment in Networking Industry;110
4.1.3.1;5.3.1 Users: From Technology Heroes to Role Specialists;111
4.1.3.2;5.3.2 Tasks: From Break/Fix to Life Cycle Models;112
4.1.3.3;5.3.3 Systems: Networks as Programmable Platforms;114
4.1.3.4;5.3.4 Context: The Socio-Technical Generation Y;114
4.1.4;5.4 Emerging Adoption of Network Automation;115
4.1.4.1;5.4.1 Type I Adoptions;116
4.1.4.2;5.4.2 Type II Adoptions;116
4.1.4.3;5.4.3 Type III Adoptions;117
4.1.5;5.5 The Role of Network Automation;117
4.1.5.1;5.5.1 Operational Transformations;118
4.1.5.2;5.5.2 Architectural Transformations;118
4.1.6;5.6 Future Work and Open Questions;119
4.1.7;Appendix A. Short Biography;120
4.1.8;References;120
4.2;Chapter 6: Embedding Operational Intelligence into Junos Devices Through On-Box Scripts;122
4.2.1;6.1 Introduction;122
4.2.2;6.2 Junos XML API;123
4.2.2.1;6.2.1 Junos On-Box Scripts;123
4.2.2.2;6.2.2 XSLT and SLAX;123
4.2.2.3;6.2.3 Example Code;124
4.2.3;6.3 Op Scripts;125
4.2.3.1;6.3.1 Customized Show Commands;126
4.2.3.2;6.3.2 Automated Troubleshooting;127
4.2.3.3;6.3.3 Con guration Changes;131
4.2.4;6.4 Commit Scripts;133
4.2.5;6.5 Event Scripts;137
4.2.5.1;6.5.1 Connectivity-Based Con gurations;139
4.2.5.2;6.5.2 Time-Based Events;141
4.2.5.3;6.5.3 Troubleshooting: AI-Scripts and Service Now;142
4.2.6;6.6 Summary;143
4.2.7;References;143
4.3;Chapter 7: Developing Innovative Embedded Applications in the Network with the Junos SDK;144
4.3.1;7.1 Introduction : Evolving an Operating System into a Platform;144
4.3.2;7.2 Applications in the Junos Architecture;145
4.3.2.1;7.2.1 Partitions of the Junos Architecture and Hardware;145
4.3.2.1.1;7.2.1.1 The Control Plane;145
4.3.2.1.2;7.2.1.2 The Data Plane;146
4.3.2.1.3;7.2.1.3 The Services Plane;147
4.3.2.2;7.2.2 Integrated Hardware;148
4.3.2.3;7.2.3 Traf c Types;148
4.3.3;7.3 Working with Junos Features Through the SDK APIs;149
4.3.3.1;7.3.1 Familiar Basics;149
4.3.3.2;7.3.2 Working with Interfaces;150
4.3.3.3;7.3.3 Manipulating the Data Plane Functions;150
4.3.3.4;7.3.4 Seamless User Interface Integration;151
4.3.3.5;7.3.5 Using Other Junos OS Features on the RE;152
4.3.3.5.1;7.3.5.1 SNMP;152
4.3.3.5.2;7.3.5.2 AAA;152
4.3.3.6;7.3.6 Packet Processing, Data Traf c Distribution, and Concurrency Control;153
4.3.3.7;7.3.7 Using Other Junos OS Features on the Service Engine;154
4.3.4;7.4 Development with Security and Reliability in Mind;154
4.3.4.1;7.4.1 Securely Deploying and Operating Applications;155
4.3.4.2;7.4.2 Developing and Managing Additional Security and Resilience;155
4.3.4.3;7.4.3 Application High Availability;156
4.3.5;7.5 Building a Service Application;157
4.3.5.1;7.5.1 Managing the Services Plane and Data Traf c Steering;157
4.3.5.2;7.5.2 The Design Models and Components;158
4.3.5.2.1;7.5.2.1 Autonomy and Polling Control Enabled by the Process Model;158
4.3.5.2.2;7.5.2.2 Service Chaining and Session Management Enabled by the Plug-In Model;159
4.3.6;7.6 Development Environment;161
4.3.7;7.7 Application Examples;162
4.3.7.1;7.7.1 MoniTube;162
4.3.7.2;7.7.2 Equilibrium;163
4.3.8;7.8 Conclusion;164
4.4;Chapter 8: Using Embedded Scripting to De ne a Protocol for High-Available Data Center Interconnect;165
4.4.1;8.1 Problem Context;165
4.4.2;8.2 Problem Description;166
4.4.3;8.3 Solution Architecture;167
4.4.4;8.4 Node Synchronization Using Semaphore;170
4.4.5;8.5 Creating Dual Homing Using Semaphore;171
4.4.6;8.6 Implementing the EEM Semaphore Protocol;174
4.4.7;8.7 Add-Ons to Improve the EEM Semaphore Protocol;180
4.4.8;8.8 Node Boot Time Management;181
4.4.9;8.9 Experience from Real Life Implementation in Operational Network;182
4.4.10;8.10 Conclusion;183
4.4.11;References;183
4.4.11.1;Further references about these technologies could be found at;183
4.5;Chapter 9: Enabling IP-Based Smart Services;184
4.5.1;9.1 Introduction;184
4.5.2;9.2 Service Background and Terminologies;185
4.5.3;9.3 Smart Service Ten Commandments;187
4.5.4;9.4 IP-Based Smart Services;188
4.5.5;9.5 IP-Based Smart Services in the Cloud;190
4.5.6;9.6 IP-Based Smart Service Key Components;192
4.5.6.1;9.6.1 Customer Network (The Network to Be Managed);192
4.5.6.2;9.6.2 Smart Service Agent or Network Collection System;193
4.5.6.3;9.6.3 Secured Network Connectivity;193
4.5.6.4;9.6.4 Back-End Systems;194
4.5.7;9.7 Examples of IP-Based Smart Service Systems;194
4.5.7.1;9.7.1 Cisco Smart Call Home;195
4.5.7.2;9.7.2 Smart Net Total Care;197
4.5.8;9.8 Conclusions;198
4.5.9;References;199
4.6;Chapter 10: Network-Embedded Social Network Protocols;200
4.6.1;10.1 Introduction;200
4.6.2;10.2 Connect Devices to Social Media as a New Management Paradigm;201
4.6.3;10.3 The Case for Network-Embedded Social Network Protocols;202
4.6.4;10.4 A Natural Evolution Driving Embedded Automation;203
4.6.5;10.5 Social Machine-to-Machine (M2M) Communication;204
4.6.6;10.6 Instant Messaging (IM) as a Structured Management Interface Successor for the CLI;204
4.6.7;10.7 XMPP Chat as a Multiuser Multidevice Management Bus;205
4.6.8;10.8 Social Machine-to-Machine Peer Groups;207
4.6.9;10.9 The Network as an Open Social Network;208
4.6.10;10.10 Implications of Mobility;209
4.6.11;10.11 Enriched Presence for Management and Advanced Applications;210
4.6.12;10.12 Event Management Utilizing Publish-Subscribe;213
4.6.13;10.13 Social Network Upgrades;214
4.6.14;10.14 XMPP as a Programmatic Interface;214
4.6.15;10.15 Embedded Social Network Protocols as Smart Services Enablers;215
4.6.16;10.16 Embedded Microblogging in Managed Devices;216
4.6.17;10.17 Friend My Network;218
4.6.18;10.18 The Network as a Social Media Platform;218
4.6.19;10.19 Conclusion;219
4.6.20;References;220
4.7;Chapter 11: OpenFlow: A Perspective for Building Versatile Networks;222
4.7.1;11.1 Introduction;222
4.7.1.1;11.1.1 Motivation;222
4.7.1.2;11.1.2 Background;223
4.7.2;11.2 OpenFlow Basics;224
4.7.2.1;11.2.1 Architecture;224
4.7.2.2;11.2.2 Programming OpenFlow;228
4.7.2.3;11.2.3 OpenFlow 1.1;228
4.7.2.3.1;11.2.3.1 The OpenFlow Tools;229
4.7.2.4;11.2.4 Frameworks;231
4.7.2.4.1;11.2.4.1 OpenFlow Controllers;231
4.7.2.4.2;11.2.4.2 FlowVisor;232
4.7.3;11.3 Use Cases;232
4.7.3.1;11.3.1 Hub;233
4.7.3.2;11.3.2 Switch;235
4.7.3.3;11.3.3 Mirroring the Linux Networking Stack to an OpenFlow Switch;238
4.7.3.4;11.3.4 Hardware Slicing;241
4.7.4;11.4 OpenFlow Projects;243
4.7.4.1;11.4.1 Open vSwitch;243
4.7.4.2;11.4.2 OpenFlowMPLS;244
4.7.4.3;11.4.3 Open Networking Foundation;245
4.7.4.4;11.4.4 Research Projects;246
4.7.4.4.1;11.4.4.1 Fire;246
4.7.4.4.2;11.4.4.2 Change;247
4.7.4.4.3;11.4.4.3 G-Lab VirtuRAMA;248
4.7.5;11.5 Outlook;249
4.7.6;References;249
4.8;Chapter 12: Application and Network Resource Access Control;251
4.8.1;12.1 Introduction;251
4.8.2;12.2 RAC Framework;253
4.8.3;12.3 Application RAC;255
4.8.4;12.4 Network RAC;256
4.8.4.1;12.4.1 User Access Control to Network;256
4.8.4.2;12.4.2 Access Control Applied to Packet;259
4.8.5;12.5 ARAC and NRAC Joint Operation;262
4.8.5.1;12.5.1 Integrated or Interoperable ARAC and NRAC;262
4.8.6;12.6 Network-Based or Network-Embedded ARAC;263
4.8.7;12.7 RAC in Cloud;264
4.8.8;12.8 Conclusion;265
4.8.9;References;266
4.9;Chapter 13: Protocols for Distributed Embedded Management;267
4.9.1;13.1 Introduction;267
4.9.2;13.2 Distributed Management;268
4.9.2.1;13.2.1 The Centralized Management Model;268
4.9.2.2;13.2.2 Approaches to Distributed Management;269
4.9.2.3;13.2.3 An Architecture for Peer-to-Peer Management;270
4.9.2.4;13.2.4 Comparing the Discussed Approaches;271
4.9.3;13.3 Protocols for Distributed Management;272
4.9.3.1;13.3.1 The Echo Protocol;273
4.9.3.1.1;13.3.1.1 The Echo Algorithm by Segall;274
4.9.3.1.2;13.3.1.2 The Echo Protocol;275
4.9.3.1.3;13.3.1.3 Echo-Based Management Operations;278
4.9.3.1.3.1; Computing Global Functions of Local Variables;278
4.9.3.1.3.2; Network Search;280
4.9.3.1.3.3; Performing Local Operations on Nodes with Selected Properties;280
4.9.3.1.4;13.3.1.4 Performance of Echo-Based Operations;280
4.9.3.1.5;13.3.1.5 Extensions for Practical Applications;282
4.9.3.2;13.3.2 The Tree-Based GAP Protocol;282
4.9.3.2.1;13.3.2.1 Design Goals and Design Principles;282
4.9.3.2.2;13.3.2.2 Underlying Algorithms;283
4.9.3.2.3;13.3.2.3 The GAP Protocol;286
4.9.3.2.4;13.3.2.4 Performance of the GAP Protocol;290
4.9.3.2.5;13.3.2.5 Extensions for Practical Applications;291
4.9.4;13.4 Extensions of Echo and GAP Protocols;292
4.9.5;References;293
4.10;Chapter 14: Peer-to-Peer (P2P)-Based Network Management;295
4.10.1;14.1 Introduction;295
4.10.2;14.2 P2P Concepts Employed in Network Management;296
4.10.2.1;14.2.1 Overlay Scope;296
4.10.2.2;14.2.2 Peer Roles;297
4.10.2.3;14.2.3 Management Services and Access Control;298
4.10.2.4;14.2.4 Peer Groups;299
4.10.3;14.3 Building Blocks for P2P-Based Network Management Architectures;299
4.10.3.1;14.3.1 Peer Pro les to De ne Roles;300
4.10.3.2;14.3.2 Management Components and Containers;300
4.10.3.3;14.3.3 Management Services;300
4.10.3.4;14.3.4 Example;301
4.10.4;14.4 Improved Connectivity for Management Information Exchange;302
4.10.4.1;14.4.1 Connectivity Issues Among Management Entities Over the Internet;302
4.10.4.2;14.4.2 P2P Application Layer Routing to Improve Management Connectivity;302
4.10.4.3;14.4.3 Addressing End Devices in a P2P Management Overlay;303
4.10.4.4;14.4.4 Performance Issues;303
4.10.5;14.5 Distributing Management Tasks Using Groups of Peers;305
4.10.6;14.6 P2P for Human-Centric Cooperative Management;306
4.10.6.1;14.6.1 P2P for Human-Centric Con guration Management;306
4.10.6.2;14.6.2 Support for Shared Network Views;307
4.10.6.3;14.6.3 Noti cation Handling;308
4.10.7;14.7 Self-Healing Architecture for Monitoring Infrastructures;308
4.10.7.1;14.7.1 P2P Management Overlay and Services;308
4.10.7.2;14.7.2 Failure Detection;309
4.10.7.3;14.7.3 Service Instance Activation and Policies;310
4.10.7.4;14.7.4 System Implementation;312
4.10.7.5;14.7.5 Experimental Evaluation;313
4.10.7.6;14.7.6 Multiple Crashing Peers;314
4.10.7.7;14.7.7 Varying Number of Peers and Services;316
4.10.8;14.8 Additional Issues on P2P-Based Network Management;318
4.10.9;References;318
4.11;Chapter 15: Scalable and Robust Decentralized IP Traf c Flow Collection and Analysis (SCRIPT);320
4.11.1;15.1 Introduction;320
4.11.2;15.2 Background;322
4.11.2.1;15.2.1 Related Work;322
4.11.2.2;15.2.2 Terms and De nitions;323
4.11.3;15.3 SCRIPT Platform, Assumptions, and Applications;325
4.11.3.1;15.3.1 SCRIPT Platform;325
4.11.3.2;15.3.2 Assumptions;326
4.11.3.3;15.3.3 Requirements;327
4.11.3.4;15.3.4 Functionality Overview;327
4.11.3.5;15.3.5 Application Scenarios;328
4.11.3.5.1;15.3.5.1 Flow Record Storage SCRIPT Application;328
4.11.3.5.2;15.3.5.2 One-Way Delay Measurement SCRIPT Application;329
4.11.3.5.3;15.3.5.3 Asymmetric Route Detection SCRIPT Application;330
4.11.4;15.4 SCRIPT Architecture;332
4.11.4.1;15.4.1 Network Architecture and Topology;332
4.11.4.2;15.4.2 SCRIPT Mechanisms;333
4.11.4.2.1;15.4.2.1 Peer-to-Peer Overlay;333
4.11.4.2.2;15.4.2.2 Flow Record Routing;335
4.11.4.2.3;15.4.2.3 Peer Information Caching;337
4.11.4.2.4;15.4.2.4 Template Coordination;337
4.11.4.2.5;15.4.2.5 Exporter Con guration and NetFlow Version 5 Records;338
4.11.4.3;15.4.3 SCRIPT Node;338
4.11.4.4;15.4.4 SCRIPT Controller;340
4.11.4.5;15.4.5 SCRIPT API;340
4.11.5;15.5 Evaluation;342
4.11.6;15.6 Summary and Conclusions;348
4.11.7;References;348
5;Index;350



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.