Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3143361.3143380acmconferencesArticle/Chapter ViewAbstractPublication PagesconextConference Proceedingsconference-collections
research-article

Supporting Diverse Dynamic Intent-based Policies using Janus

Published: 28 November 2017 Publication History

Abstract

Existing network policy abstractions handle basic group based reachability and access control list based security policies. However, QoS policies as well as dynamic policies are also important and not representing them in the high level policy abstraction poses serious limitations. At the same time, efficiently configuring and composing group based QoS and dynamic policies present significant technical challenges, such as (a) maintaining group granularity during configuration, (b) dealing with network-bandwidth contention among policies from distinct writers and (c) dealing with multiple path changes corresponding to dynamically changing policies, group membership and end-point mobility. In this paper we propose Janus, a system which makes two major contributions. First, we extend the prior policy graph abstraction model to represent complex QoS and dynamic tateful/temporal policies. Second, we convert the policy configuration problem into an optimization problem with the goal of maximizing the number of satisfied and configured policies, and minimizing the number of path changes under dynamic environments. To solve this, Janus presents several novel heuristic algorithms. We evaluate our system using a diverse set of bandwidth policies and network topologies. Our experiments demonstrate that Janus can achieve near-optimal solutions in a reasonable amount of time.

References

[1]
2017. Aruba Networks: Aruba ClearPass Policy Manager. https://tinyurl.com/j98p6xk. (2017).
[2]
2017. Boulder Intent-based NBI. http://tinyurl.com/zzvolsb. (2017).
[3]
2017. Cisco: Creating Time-of-Day QoS Service Policies. https://tinyurl.com/j7l8tq9. (2017).
[4]
2017. Gurobi. http://www.gurobi.com/. (2017).
[5]
2017. NETWORK PERFORMANCE: LINKS BETWEEN LATENCY, THROUGHPUT AND PACKET LOSS. http://tinyurl.com/j5jo7zr. (2017).
[6]
2017. OpenDaylight Group Policy. https://wiki.opendaylight.org/view/Group_Policy:Main. (2017).
[7]
2017. OpenDaylight Network Intent Composition (NIC) Graph Implementation. https://tinyurl.com/gld2qzn. (2017).
[8]
Carolyn Jane Anderson, Nate Foster, Arjun Guha, Jean-Baptiste Jeannin, Dexter Kozen, Cole Schlesinger, and David Walker. 2014. NetKAT: Semantic Foundations for Networks (POPL '14). New York, NY, USA, 113--126.
[9]
Anu Mercian, Felipe Yrineu, Joon-Myung Kang, Raphael Amorim, Saket M Mahajani, Mario Sanchez and Sujata Banerjee. 2016. Network Intent Composition (NIC) Be Feature Update and Demo: Intent Compilation, Lifecycle Management and Automated Mapping. http://sched.co/7RBY. Presented in OpenDaylight Summit 2016.
[10]
Mina Tahmasbi Arashloo, Yaron Koral, Michael Greenberg, Jennifer Rexford, and David Walker. 2015. SNAP: Stateful Network-Wide Abstractions for Packet Processing. CoRR abs/1512.00822 (2015). http://arxiv.org/abs/1512.00822
[11]
Ryan Beckett, Ratul Mahajan, Todd Millstein, Jitendra Padhye, and David Walker. 2016. Don'T Mind the Gap: Bridging Network-wide Objectives and Device-level Configurations (SIGCOMM '16). New York, NY, USA, 328--341.
[12]
Mosharaf Chowdhury, Zhenhua Liu, Ali Ghodsi, and Ion Stoica. 2016. HUG: Multi-resource fairness for correlated and elastic demands. In USENIX NSDI.
[13]
Freddy C Chua, Julie Ward, Ying Zhang, Puneet Sharma, and Bernardo A Huberman. 2016. Stringer: Balancing latency and resource usage in service function chain provisioning. IEEE Internet Computing 20, 6 (2016), 22--31.
[14]
R. Cohen, K. Barabash, B. Rochwerger, L. Schour, D. Crisan, R. Birke, C. Minkenberg, M. Gusat, R. Recio, and V. Jain. 2013. An intent-based approach for network virtualization. In 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013). 42--50.
[15]
Seyed K Fayaz and Vyas Sekar. 2014. Testing stateful and dynamic data planes with FlowTest. In Proceedings of the third workshop on Hot topics in software defined networking. ACM, 79--84.
[16]
Seyed K. Fayaz, Tianlong Yu, Yoshiaki Tobioka, Sagar Chaki, and Vyas Sekar. 2016. BUZZ: Testing Context-Dependent Policies in Stateful Networks. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). USENIX Association, Santa Clara, CA, 275--289. https://www.usenix.org/conference/nsdi16/technical-sessions/presentation/fayaz
[17]
Seyed Kaveh Fayazbakhsh, Vyas Sekar, Minlan Yu, and Jeffrey C Mogul. 2013. Flowtags: Enforcing network-wide policies in the presence of dynamic middlebox actions. In Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking. ACM, 19--24.
[18]
Andrew D. Ferguson, Arjun Guha, Chen Liang, Rodrigo Fonseca, and Shriram Krishnamurthi. 2012. Hierarchical Policies for Software Defined Networks. In HotSDN (HotSDN '12).
[19]
Andrew D. Ferguson, Arjun Guha, Chen Liang, Rodrigo Fonseca, and Shriram Krishnamurthi. 2013. Participatory Networking: An API for Application Control of SDNs. In SIGCOMM.
[20]
Nate Foster, Rob Harrison, Michael J Freedman, Christopher Monsanto, Jennifer Rexford, Alec Story, and David Walker. 2011. Frenetic: A network programming language. In ACM SIGPLAN Notices, Vol. 46. ACM, 279--291.
[21]
Open Networking Foundation. 2014. OpenFlow Switch Specification Version 1.5.0. (2014).
[22]
Aaron Gember-Jacobson, Raajay Viswanathan, Chaithan Prakash, Robert Grandl, Junaid Khalid, Sourav Das, and Aditya Akella. 2014. OpenNF: Enabling innovation in network function control. In Proceedings of the 2014 ACM Conference on SIGCOMM. ACM, 163--174.
[23]
Chuanxiong Guo, Guohan Lu, Helen J Wang, Shuang Yang, Chao Kong, Peng Sun, Wenfei Wu, and Yongguang Zhang. 2010. Secondnet: a data center network virtualization architecture with bandwidth guarantees. In Proceedings of the 6th International COnference. ACM, 15.
[24]
Keqiang He, Junaid Khalid, Sourav Das, Aaron Gember-Jacobson, Chaithan Prakash, Aditya Akella, Li Erran Li, and Marina Thottan. 2015. Latency in software defined networks: Measurements and mitigation techniques. In ACM SIGMETRICS Performance Evaluation Review, Vol. 43. ACM, 435--436.
[25]
Victor Heorhiadi, Michael K Reiter, and Vyas Sekar. 2016. Simplifying software-defined network optimization using SOL. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). 223--237.
[26]
Timothy L. Hinrichs, Natasha S. Gude, Martin Casado, John C. Mitchell, and Scott Shenker. 2009. Practical Declarative Network Management. In WREN.
[27]
Keon Jang, Justine Sherry, Hitesh Ballani, and Toby Moncaster. 2015. Silo: Predictable message latency in the cloud. ACM SIGCOMM Computer Communication Review 45, 4 (2015), 435--448.
[28]
Xin Jin, Hongqiang Harry Liu, Rohan Gandhi, Srikanth Kandula, Ratul Mahajan, Ming Zhang, Jennifer Rexford, and Roger Wattenhofer. 2014. Dynamic scheduling of network updates. In ACM SIGCOMM Computer Communication Review, Vol. 44. ACM, 539--550.
[29]
Joon-Myung Kang, Sujata Banerjee, Jeongkeun Lee, and Mario Sanchez. 2017. Policy Canvas: Draw Your Policies for OpenStack Services. OpenStack Summit 2016 Austin, http://tinyurl.com/zsszpb7. (2017).
[30]
Joon-Myung Kang, Jeongkeun Lee, Vasudevan Nagendra, and Sujata Banerjee. 2017. LMS: Label Management Service for Intent-driven Cloud Management. In Proc. IM. 177--185.
[31]
Nanxi Kang, Ori Rottenstreich, Sanjay Rao, and Jennifer Rexford. 2015. Alpaca: Compact network policies with attribute-carrying addresses. In Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies. ACM, 7.
[32]
Eric C Kerrigan and Jan M Maciejowski. 2000. Soft constraints and exact penalty functions in model predictive control. In Control 2000 Conference, Cambridge.
[33]
H. Kim and N. Feamster. 2013. Improving network management with software defined networking. IEEE Communications Magazine 51, 2 (February 2013), 114--119.
[34]
Hyojoon Kim, Joshua Reich, Arpit Gupta, Muhammad Shahbaz, Nick Feamster, and Russ Clark. 2015. Kinetic: Verifiable Dynamic Network Control. In Proceedings of the 12th USENIX Conference on Networked Systems Design and Implementation (NSDI'15). USENIX Association, Berkeley, CA, USA, 59--72. http://dl.acm.org/citation.cfm?id=2789770.2789775
[35]
Simon Knight, Hung X Nguyen, Nickolas Falkner, Rhys Bowden, and Matthew Roughan. 2011. The internet topology zoo. IEEE Journal on Selected Areas in Communications 29, 9 (2011), 1765--1775.
[36]
Alok Kumar, Sushant Jain, Uday Naik, Anand Raghuraman, Nikhil Kasinadhuni, Enrique Cauich Zermeno, C Stephen Gunn, Jing Ai, Björn Carlin, Mihai Amarandei-Stavila, and others. 2015. BwE: Flexible, hierarchical bandwidth allocation for WAN distributed computing. In ACM SIGCOMM Computer Communication Review, Vol. 45. ACM, 1--14.
[37]
Jeongkeun Lee, Joon-Myung Kang, Chaithan Prakash, Sujata Banerjee, Yoshio Turner, Aditya Akella, Charles Clark, Yadi Ma, Puneet Sharma, and Ying Zhang. 2015. Network Policy Whiteboarding and Composition. SIGCOMM Comput. Commun. Rev. 45, 4 (Aug. 2015), 373--374.
[38]
Jeongkeun Lee, Yoshio Turner, Myungjin Lee, Lucian Popa, Sujata Banerjee, Joon-Myung Kang, and Puneet Sharma. 2014. Application-driven bandwidth guarantees in datacenters. In ACM SIGCOMM Computer Communication Review, Vol. 44. ACM, 467--478.
[39]
Jedidiah McClurg, Hossein Hojjat, Pavol Černy, and Nate Foster. 2015. Efficient synthesis of network updates. In ACM SIGPLAN Notices, Vol. 50. ACM, 196--207.
[40]
Nick McKeown, Tom Anderson, Hari Balakrishnan, Guru Parulkar, Larry Peterson, Jennifer Rexford, Scott Shenker, and Jonathan Turner. 2008. OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Computer Communication Review 38, 2 (2008), 69--74.
[41]
Minh Pham and Doan Hoang. 2016. SDN applications - the intent-based Northbound interface realisation for extended applications. In IEEE Workshop on SDN and IoT (SDN-IoT 2016).
[42]
Christopher Monsanto, Joshua Reich, Nate Foster, Jennifer Rexford, and David Walker. 2013. Composing Software Defined Networks. In Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). USENIX, Lombard, IL, 1--13. https://www.usenix.org/conference/nsdi13/technical-sessions/presentation/monsanto
[43]
Lucian Popa, Praveen Yalagandula, Sujata Banerjee, Jeffrey C Mogul, Yoshio Turner, and Jose Renato Santos. 2013. Elastic-switch: Practical work-conserving bandwidth guarantees for cloud computing. ACM SIGCOMM Computer Communication Review 43, 4 (2013), 351--362.
[44]
Chaithan Prakash, Jeongkeun Lee, Yoshio Turner, Joon-Myung Kang, Aditya Akella, Sujata Banerjee, Charles Clark, Yadi Ma, Puneet Sharma, and Ying Zhang. 2015. PGA: Using Graphs to Express and Automatically Reconcile Network Policies. SIGCOMM Comput. Commun. Rev. 45, 4 (Aug. 2015), 29--42.
[45]
Zafar Ayyub Qazi, Cheng-Chun Tu, Luis Chiang, Rui Miao, Vyas Sekar, and Minlan Yu. 2013. SIMPLE-fying middlebox policy enforcement using SDN. In ACM SIGCOMM Computer Communication Review, Vol. 43. ACM, 27--38.
[46]
Henrique Rodrigues, Jose Renato Santos, Yoshio Turner, Paolo Soares, and Dorgival O Guedes. 2011. Gatekeeper: Supporting Bandwidth Guarantees for Multi-tenant Datacenter Networks. In WIOV.
[47]
Robert Soulé, Shrutarshi Basu, Parisa Jalili Marandi, Fernando Pedone, Robert Kleinberg, Emin Gun Sirer, and Nate Foster. 2014. Merlin: A language for provisioning network resources. In Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies. ACM, 213--226.
[48]
John Strassner. 2003. Policy-based network management: solutions for the next generation. Morgan Kaufmann.
[49]
Kausik Subramanian, Loris D'Antoni, and Aditya Akella. 2017. Genesis: synthesizing forwarding tables in multi-tenant networks. In Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages. ACM, 572--585.
[50]
Yu-Wei Eric Sung, Xiaozheng Tie, Starsky H.Y. Wong, and Hongyi Zeng. 2016. Robotron: Top-down Network Management at Facebook Scale. In Proceedings of the 2016 Conference on ACM SIGCOMM 2016 Conference (SIGCOMM '16). ACM, New York, NY, USA, 426--439.
[51]
C. Trois, M. D. Del Fabro, L. C. E. de Bona, and M. Martinello. 2016. A Survey on SDN Programming Languages: Toward a Taxonomy. IEEE Communications Surveys Tutorials 18, 4 (Fourthquarter 2016), 2687--2712.
[52]
Brendan Tschaen, Ying Zhang, Theo Benson, Sujata Banerjee, Jeongkeun Lee, and Joon-Myung Kang. 2016. SFC-Checker: Checking the Correct Forwarding Behavior of Service Function Chaining. In IEEE SDN-NFV Conference.
[53]
D. C. Verma. 2002. Simplifying network administration using policy-based management. IEEE Network 16, 2 (Mar 2002), 20--26.
[54]
Andreas Voellmy, Junchang Wang, Y Richard Yang, Bryan Ford, and Paul Hudak. 2013. Maple: Simplifying SDN Programming Using Algorithmic Policies. In Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM (SIGCOMM '13). ACM, New York, NY, USA, 87--98.
[55]
Anduo Wang, Xueyuan Mei, Jason Croft, Matthew Caesar, and Brighten Godfrey. 2016. Ravel: A database-defined network. In Symposium on Software Defined Networking (SDN) Research, SOSR 2016. ACM.
[56]
James E Ward and Richard E Wendell. 1990. Approaches to sensitivity analysis in linear programming. Annals of Operations Research 27, 1 (1990), 3--38.
[57]
Wenfei Wu, Ying Zhang, and Sujata Banerjee. 2016. Automatic Synthesis of NF Models by Program Analysis. In Proceedings of the 15th ACM Workshop on Hot Topics in Networks (HotNets '16). ACM, New York, NY, USA, 29--35.
[58]
Xipeng Xiao and L. M. Ni. 1999. Internet QoS: a big picture. IEEE Network 13, 2 (Mar 1999), 8--18.
[59]
E Alper Yildirim and Stephen J Wright. 2002. Warm-start strategies in interior-point methods for linear programming. SIAM Journal on Optimization 12, 3 (2002), 782--810.
[60]
Yifei Yuan, Dong Lin, Rajeev Alur, and Boon Thau Loo. 2015. Scenario-based programming for sdn policies. In Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies. ACM, 34.
[61]
Ying Zhang, Wenfei Wu, Sujata Banerjee, Joon-Myung Kang, and Mario A Sanchez. 2017. SLA-Verifier: Stateful and Quantitative Verification for Service Chaining. In Proc. INFOCOM.

Cited By

View all
  • (2024)Exploiting Temporal Vulnerabilities for Unauthorized Access in Intent-based NetworkingProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670301(3630-3644)Online publication date: 2-Dec-2024
  • (2024)Security Challenges of Intent-Based NetworkingCommunications of the ACM10.1145/3639702Online publication date: 21-Jun-2024
  • (2024)Building the Foundations of Ethical Networks: Integrating Key Value Indicators for Social, Economic, and Environmental Impact2024 IEEE 35th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)10.1109/PIMRC59610.2024.10817165(1-6)Online publication date: 2-Sep-2024
  • Show More Cited By

Index Terms

  1. Supporting Diverse Dynamic Intent-based Policies using Janus

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CoNEXT '17: Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies
    November 2017
    492 pages
    ISBN:9781450354226
    DOI:10.1145/3143361
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 28 November 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Network Control and Management
    2. SDN

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    CoNEXT '17
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 198 of 789 submissions, 25%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)47
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 14 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Exploiting Temporal Vulnerabilities for Unauthorized Access in Intent-based NetworkingProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670301(3630-3644)Online publication date: 2-Dec-2024
    • (2024)Security Challenges of Intent-Based NetworkingCommunications of the ACM10.1145/3639702Online publication date: 21-Jun-2024
    • (2024)Building the Foundations of Ethical Networks: Integrating Key Value Indicators for Social, Economic, and Environmental Impact2024 IEEE 35th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)10.1109/PIMRC59610.2024.10817165(1-6)Online publication date: 2-Sep-2024
    • (2024)Intent- Based Network Management and Its Application Prospects in Smart Grids2024 3rd International Conference on Cloud Computing, Big Data Application and Software Engineering (CBASE)10.1109/CBASE64041.2024.10824575(884-890)Online publication date: 11-Oct-2024
    • (2023)INTENDERProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620487(4463-4480)Online publication date: 9-Aug-2023
    • (2023)Double-Layer Search and Adaptive Pooling Fusion for Reference-Based Image Super-ResolutionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/360493720:1(1-23)Online publication date: 25-Aug-2023
    • (2023)SLA Management in Intent-Driven Service Management Systems: A Taxonomy and Future DirectionsACM Computing Surveys10.1145/358933955:13s(1-38)Online publication date: 13-Jul-2023
    • (2023)An Intent-based Framework for Vehicular Edge Computing2023 IEEE International Conference on Pervasive Computing and Communications (PerCom)10.1109/PERCOM56429.2023.10099081(121-130)Online publication date: 13-Mar-2023
    • (2023)AppleSeed: Intent-Based Multi-Domain Infrastructure Management via Few-Shot Learning2023 IEEE 9th International Conference on Network Softwarization (NetSoft)10.1109/NetSoft57336.2023.10175410(539-544)Online publication date: 19-Jun-2023
    • (2023)Full-Life Cycle Intent-Driven Network Verification: Challenges and ApproachesIEEE Network10.1109/MNET.124.220012737:5(145-153)Online publication date: Sep-2023
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media