Network-Embedded Management and Applications (eBook)
X, 354 Seiten
Springer New York (Verlag)
978-1-4419-6769-5 (ISBN)
Despite the explosion of networking services and applications in the past decades, the basic technological underpinnings of the Internet have remained largely unchanged. At its heart are special-purpose appliances that connect us to the digital world, commonly known as switches and routers. Now, however, the traditional framework is being increasingly challenged by new methods that are jostling for a position in the 'next-generation' Internet. The concept of a network that is becoming more programmable is one of the aspects that are taking center stage. This opens new possibilities to embed software applications inside the network itself and to manage networks and communications services with unprecedented ease and efficiency.
In this edited volume, distinguished experts take the reader on a tour of different facets of programmable network infrastructure and applications that exploit it. Presenting the state of the art in network embedded management and applications and programmable network infrastructure, the book conveys fundamental concepts and provides a glimpse into various facets of the latest technology in the field.
Despite the explosion of networking services and applications in the past decades, the basic technological underpinnings of the Internet have remained largely unchanged. At its heart are special-purpose appliances that connect us to the digital world, commonly known as switches and routers. Now, however, the traditional framework is being increasingly challenged by new methods that are jostling for a position in the "e;next-generation"e; Internet. The concept of a network that is becoming more programmable is one of the aspects that are taking center stage. This opens new possibilities to embed software applications inside the network itself and to manage networks and communications services with unprecedented ease and efficiency. In this edited volume, distinguished experts take the reader on a tour of different facets of programmable network infrastructure and applications that exploit it. Presenting the state of the art in network embedded management and applications and programmable network infrastructure, the book conveys fundamental concepts and provides a glimpse into various facets of the latest technology in the field.
Preface 6
Contents 10
Part1: Foundations of Network-Embedded Management and Applications 12
Chapter 1: Motivation: The Dawn of the Age of Network-Embedded Applications 13
1.1 Introduction: What Are Network-Embedded Applications? 13
1.2 Network-Embedded Versus Network-Attached 15
1.2.1 Central Management 15
1.2.2 Distributed Management 15
1.2.3 Network-Attached 16
1.2.3.1 Load Balancers 17
1.2.3.2 Set-Top Box (STB) 17
1.2.4 Network-Embedded 17
1.3 Opportunities: Network-Embedded Application Scenarios 20
1.3.1 Industry Initiatives 24
1.4 Business Considerations 25
1.5 Technical Challenges and Future Opportunities 26
1.5.1 Technical Challenges 26
1.5.2 Future Opportunities 27
1.5.3 Where Do We Stand? 29
References 30
Chapter 2: A Brief History of Network Programmability and Related Fields 32
2.1 Introduction to Network Programmability 32
2.2 Routing 32
2.2.1 Advanced Routing Protocols 33
2.2.2 Routing in Mobile Environments 34
2.2.3 Quality of Service 35
2.2.4 Embedded Monitoring 36
2.2.5 Embedded Programmability 40
2.2.6 Programmable Hardware 41
2.2.7 Zero Con guration 41
2.2.8 Service Discovery 42
2.3 Management by Delegation 44
2.4 Policy-Based Networking 45
2.4.1 Integrated Services 45
2.4.2 Differentiated Services 46
2.4.3 Common Open Policy Service (COPS) 47
2.4.4 OpenFlow 49
2.5 Middleware and Web Services 50
2.5.1 Middleware 50
2.5.2 Service-Oriented Architecture (SOA) and Web Services 51
2.5.2.1 SOA 51
2.5.2.2 Web Services 52
2.6 Autonomic Computing and Self-Management 52
2.7 Peer-to-Peer Networking and DHTs 55
2.7.1 Peer-to-Peer Networking 55
2.7.2 Hash Tables and Distributed Hash Tables (DHT) 55
2.8 Network Virtualization and Cloud Computing 57
2.8.1 Grid Computing 58
2.8.2 Cloud Computing 59
2.8.3 Embedded Cloud Versus Over-the-Top (OTT) Services 61
2.9 Conclusion 62
References 63
Chapter 3: Network-Embedded Management* 67
3.1 Embedded Management Drivers 69
3.1.1 Total Cost of Ownership (TCO) 69
3.1.2 Reduction in Required Expertise 70
3.1.3 Greater Network Resilience 71
3.1.4 Reduced Dependency on External System Support 71
3.2 Migrating Management Functionality into the Network 72
3.2.1 Autonomic Systems 73
3.2.2 Understanding Autonomic System Limitations 74
3.3 Network-Embedded Management Implementation 76
3.4 The Evolution of Network-Embedded Management Capabilities 78
3.4.1 Management Content 78
3.4.2 Communication Pattern Ef ciency 80
3.4.3 Adaptiveness 82
3.4.4 Autonomy 84
3.4.5 Closing Remarks 85
References 85
Chapter 4: Improving Manageability Through Network-Embedded Management 87
4.1 Management Interfaces 88
4.1.1 Completeness 88
4.1.2 Consistency 92
4.1.3 Ef ciency 95
4.2 Embedded Management Intelligence 100
4.2.1 Migrating Management Functionality into the Network 101
4.2.2 Other Management Support Functions 104
References 106
Part2: (Invited Chapters) Infrastructure, Case Studies, Research Areas 107
Chapter 5: On the Relevance and Adoption of Network Automation 108
5.1 Introduction 108
5.2 Rapid Diffusion at a Price 109
5.3 A Unique Moment in Networking Industry 110
5.3.1 Users: From Technology Heroes to Role Specialists 111
5.3.2 Tasks: From Break/Fix to Life Cycle Models 112
5.3.3 Systems: Networks as Programmable Platforms 114
5.3.4 Context: The Socio-Technical Generation Y 114
5.4 Emerging Adoption of Network Automation 115
5.4.1 Type I Adoptions 116
5.4.2 Type II Adoptions 116
5.4.3 Type III Adoptions 117
5.5 The Role of Network Automation 117
5.5.1 Operational Transformations 118
5.5.2 Architectural Transformations 118
5.6 Future Work and Open Questions 119
Appendix A. Short Biography 120
References 120
Chapter 6: Embedding Operational Intelligence into Junos Devices Through On-Box Scripts 122
6.1 Introduction 122
6.2 Junos XML API 123
6.2.1 Junos On-Box Scripts 123
6.2.2 XSLT and SLAX 123
6.2.3 Example Code 124
6.3 Op Scripts 125
6.3.1 Customized Show Commands 126
6.3.2 Automated Troubleshooting 127
6.3.3 Con guration Changes 131
6.4 Commit Scripts 133
6.5 Event Scripts 137
6.5.1 Connectivity-Based Con gurations 139
6.5.2 Time-Based Events 141
6.5.3 Troubleshooting: AI-Scripts and Service Now 142
6.6 Summary 143
References 143
Chapter 7: Developing Innovative Embedded Applications in the Network with the Junos SDK 144
7.1 Introduction : Evolving an Operating System into a Platform 144
7.2 Applications in the Junos Architecture 145
7.2.1 Partitions of the Junos Architecture and Hardware 145
7.2.1.1 The Control Plane 145
7.2.1.2 The Data Plane 146
7.2.1.3 The Services Plane 147
7.2.2 Integrated Hardware 148
7.2.3 Traf c Types 148
7.3 Working with Junos Features Through the SDK APIs 149
7.3.1 Familiar Basics 149
7.3.2 Working with Interfaces 150
7.3.3 Manipulating the Data Plane Functions 150
7.3.4 Seamless User Interface Integration 151
7.3.5 Using Other Junos OS Features on the RE 152
7.3.5.1 SNMP 152
7.3.5.2 AAA 152
7.3.6 Packet Processing, Data Traf c Distribution, and Concurrency Control 153
7.3.7 Using Other Junos OS Features on the Service Engine 154
7.4 Development with Security and Reliability in Mind 154
7.4.1 Securely Deploying and Operating Applications 155
7.4.2 Developing and Managing Additional Security and Resilience 155
7.4.3 Application High Availability 156
7.5 Building a Service Application 157
7.5.1 Managing the Services Plane and Data Traf c Steering 157
7.5.2 The Design Models and Components 158
7.5.2.1 Autonomy and Polling Control Enabled by the Process Model 158
7.5.2.2 Service Chaining and Session Management Enabled by the Plug-In Model 159
7.6 Development Environment 161
7.7 Application Examples 162
7.7.1 MoniTube 162
7.7.2 Equilibrium 163
7.8 Conclusion 164
Chapter 8: Using Embedded Scripting to De ne a Protocol for High-Available Data Center Interconnect 165
8.1 Problem Context 165
8.2 Problem Description 166
8.3 Solution Architecture 167
8.4 Node Synchronization Using Semaphore 170
8.5 Creating Dual Homing Using Semaphore 171
8.6 Implementing the EEM Semaphore Protocol 174
8.7 Add-Ons to Improve the EEM Semaphore Protocol 180
8.8 Node Boot Time Management 181
8.9 Experience from Real Life Implementation in Operational Network 182
8.10 Conclusion 183
References 183
Further references about these technologies could be found at 183
Chapter 9: Enabling IP-Based Smart Services 184
9.1 Introduction 184
9.2 Service Background and Terminologies 185
9.3 Smart Service Ten Commandments 187
9.4 IP-Based Smart Services 188
9.5 IP-Based Smart Services in the Cloud 190
9.6 IP-Based Smart Service Key Components 192
9.6.1 Customer Network (The Network to Be Managed) 192
9.6.2 Smart Service Agent or Network Collection System 193
9.6.3 Secured Network Connectivity 193
9.6.4 Back-End Systems 194
9.7 Examples of IP-Based Smart Service Systems 194
9.7.1 Cisco Smart Call Home 195
9.7.2 Smart Net Total Care 197
9.8 Conclusions 198
References 199
Chapter 10: Network-Embedded Social Network Protocols 200
10.1 Introduction 200
10.2 Connect Devices to Social Media as a New Management Paradigm 201
10.3 The Case for Network-Embedded Social Network Protocols 202
10.4 A Natural Evolution Driving Embedded Automation 203
10.5 Social Machine-to-Machine (M2M) Communication 204
10.6 Instant Messaging (IM) as a Structured Management Interface Successor for the CLI 204
10.7 XMPP Chat as a Multiuser Multidevice Management Bus 205
10.8 Social Machine-to-Machine Peer Groups 207
10.9 The Network as an Open Social Network 208
10.10 Implications of Mobility 209
10.11 Enriched Presence for Management and Advanced Applications 210
10.12 Event Management Utilizing Publish-Subscribe 213
10.13 Social Network Upgrades 214
10.14 XMPP as a Programmatic Interface 214
10.15 Embedded Social Network Protocols as Smart Services Enablers 215
10.16 Embedded Microblogging in Managed Devices 216
10.17 Friend My Network 218
10.18 The Network as a Social Media Platform 218
10.19 Conclusion 219
References 220
Chapter 11: OpenFlow: A Perspective for Building Versatile Networks 222
11.1 Introduction 222
11.1.1 Motivation 222
11.1.2 Background 223
11.2 OpenFlow Basics 224
11.2.1 Architecture 224
11.2.2 Programming OpenFlow 228
11.2.3 OpenFlow 1.1 228
11.2.3.1 The OpenFlow Tools 229
11.2.4 Frameworks 231
11.2.4.1 OpenFlow Controllers 231
11.2.4.2 FlowVisor 232
11.3 Use Cases 232
11.3.1 Hub 233
11.3.2 Switch 235
11.3.3 Mirroring the Linux Networking Stack to an OpenFlow Switch 238
11.3.4 Hardware Slicing 241
11.4 OpenFlow Projects 243
11.4.1 Open vSwitch 243
11.4.2 OpenFlowMPLS 244
11.4.3 Open Networking Foundation 245
11.4.4 Research Projects 246
11.4.4.1 Fire 246
11.4.4.2 Change 247
11.4.4.3 G-Lab VirtuRAMA 248
11.5 Outlook 249
References 249
Chapter 12: Application and Network Resource Access Control 251
12.1 Introduction 251
12.2 RAC Framework 253
12.3 Application RAC 255
12.4 Network RAC 256
12.4.1 User Access Control to Network 256
12.4.2 Access Control Applied to Packet 259
12.5 ARAC and NRAC Joint Operation 262
12.5.1 Integrated or Interoperable ARAC and NRAC 262
12.6 Network-Based or Network-Embedded ARAC 263
12.7 RAC in Cloud 264
12.8 Conclusion 265
References 266
Chapter 13: Protocols for Distributed Embedded Management 267
13.1 Introduction 267
13.2 Distributed Management 268
13.2.1 The Centralized Management Model 268
13.2.2 Approaches to Distributed Management 269
13.2.3 An Architecture for Peer-to-Peer Management 270
13.2.4 Comparing the Discussed Approaches 271
13.3 Protocols for Distributed Management 272
13.3.1 The Echo Protocol 273
13.3.1.1 The Echo Algorithm by Segall 274
13.3.1.2 The Echo Protocol 275
13.3.1.3 Echo-Based Management Operations 278
Computing Global Functions of Local Variables 278
Network Search 280
Performing Local Operations on Nodes with Selected Properties 280
13.3.1.4 Performance of Echo-Based Operations 280
13.3.1.5 Extensions for Practical Applications 282
13.3.2 The Tree-Based GAP Protocol 282
13.3.2.1 Design Goals and Design Principles 282
13.3.2.2 Underlying Algorithms 283
13.3.2.3 The GAP Protocol 286
13.3.2.4 Performance of the GAP Protocol 290
13.3.2.5 Extensions for Practical Applications 291
13.4 Extensions of Echo and GAP Protocols 292
References 293
Chapter 14: Peer-to-Peer (P2P)-Based Network Management 295
14.1 Introduction 295
14.2 P2P Concepts Employed in Network Management 296
14.2.1 Overlay Scope 296
14.2.2 Peer Roles 297
14.2.3 Management Services and Access Control 298
14.2.4 Peer Groups 299
14.3 Building Blocks for P2P-Based Network Management Architectures 299
14.3.1 Peer Pro les to De ne Roles 300
14.3.2 Management Components and Containers 300
14.3.3 Management Services 300
14.3.4 Example 301
14.4 Improved Connectivity for Management Information Exchange 302
14.4.1 Connectivity Issues Among Management Entities Over the Internet 302
14.4.2 P2P Application Layer Routing to Improve Management Connectivity 302
14.4.3 Addressing End Devices in a P2P Management Overlay 303
14.4.4 Performance Issues 303
14.5 Distributing Management Tasks Using Groups of Peers 305
14.6 P2P for Human-Centric Cooperative Management 306
14.6.1 P2P for Human-Centric Con guration Management 306
14.6.2 Support for Shared Network Views 307
14.6.3 Noti cation Handling 308
14.7 Self-Healing Architecture for Monitoring Infrastructures 308
14.7.1 P2P Management Overlay and Services 308
14.7.2 Failure Detection 309
14.7.3 Service Instance Activation and Policies 310
14.7.4 System Implementation 312
14.7.5 Experimental Evaluation 313
14.7.6 Multiple Crashing Peers 314
14.7.7 Varying Number of Peers and Services 316
14.8 Additional Issues on P2P-Based Network Management 318
References 318
Chapter 15: Scalable and Robust Decentralized IP Traf c Flow Collection and Analysis (SCRIPT) 320
15.1 Introduction 320
15.2 Background 322
15.2.1 Related Work 322
15.2.2 Terms and De nitions 323
15.3 SCRIPT Platform, Assumptions, and Applications 325
15.3.1 SCRIPT Platform 325
15.3.2 Assumptions 326
15.3.3 Requirements 327
15.3.4 Functionality Overview 327
15.3.5 Application Scenarios 328
15.3.5.1 Flow Record Storage SCRIPT Application 328
15.3.5.2 One-Way Delay Measurement SCRIPT Application 329
15.3.5.3 Asymmetric Route Detection SCRIPT Application 330
15.4 SCRIPT Architecture 332
15.4.1 Network Architecture and Topology 332
15.4.2 SCRIPT Mechanisms 333
15.4.2.1 Peer-to-Peer Overlay 333
15.4.2.2 Flow Record Routing 335
15.4.2.3 Peer Information Caching 337
15.4.2.4 Template Coordination 337
15.4.2.5 Exporter Con guration and NetFlow Version 5 Records 338
15.4.3 SCRIPT Node 338
15.4.4 SCRIPT Controller 340
15.4.5 SCRIPT API 340
15.5 Evaluation 342
15.6 Summary and Conclusions 348
References 348
Index 350
Erscheint lt. Verlag | 25.7.2012 |
---|---|
Zusatzinfo | X, 354 p. |
Verlagsort | New York |
Sprache | englisch |
Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
Technik ► Elektrotechnik / Energietechnik | |
Technik ► Nachrichtentechnik | |
Schlagworte | Embedded Management • Network-embedded applications • Network-embedded management • network infrastructure • Network Management |
ISBN-10 | 1-4419-6769-9 / 1441967699 |
ISBN-13 | 978-1-4419-6769-5 / 9781441967695 |
Haben Sie eine Frage zum Produkt? |
Größe: 10,6 MB
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich