Using an Identity Plane for Adapting Network Behavior to User and Service Requirements

被引:3
|
作者
Martinez-Julia, Pedro [1 ]
Skarmeta, Antonio F. [1 ]
机构
[1] Univ Murcia, Dept Commun & Informat Engn, E-30100 Murcia, Spain
关键词
Future internet; Identity; Overlay network; Autonomic computing; Self-management; SOA; ARCHITECTURE;
D O I
10.1007/978-3-319-26925-2_19
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The advent of Software Defined Networking (SDN) has opened the door to new network functions that were difficult or even impossible to have. This has been the case of typically complex network management operations, which now can be layered on top of SDN controllers in order to adapt network behavior to achieve some objectives or quickly react to network events so network consistence is unaltered by them. However, users and services have little to say in current SDN architectures. In this paper we discuss how to use an Identity Plane to carry user and service identities and requirements to network controllers, which would contact a management service that follows the management model proposed by Autonomic Computing (AC) to know the necessary changes to adapt the network behavior to such requirements.
引用
收藏
页码:253 / 265
页数:13
相关论文
共 50 条
  • [21] Assurance Requirements for Mutual User and Service Provider Authentication
    Josang, Audun
    DATA PRIVACY MANAGEMENT, AUTONOMOUS SPONTANEOUS SECURITY, AND SECURITY ASSURANCE, 2015, 8872 : 26 - 44
  • [22] Component behavior testing based on user requirements
    Li L.
    Wang Z.
    Liu L.
    Gaojishu Tongxin/Chinese High Technology Letters, 2010, 20 (07): : 727 - 732
  • [23] Service requirements in optical network design
    Jaeger, Monika
    ICTON 2007: Proceedings of the 9th International Conference on Transparent Optical Networks, Vol 3, 2007, : 183 - 186
  • [24] Requirements for intelligent network service operations
    Fujita, Yuzo
    Ookubo, Kazuhiko
    Tokunaga, Hiroshi
    Journal of Network and Systems Management, 1995, 3 (02): : 195 - 216
  • [25] Network security and user abnormal behavior detection by using deep neural network
    Pan, Yun
    INTERNET TECHNOLOGY LETTERS, 2021, 4 (03)
  • [26] An Evaluation of Network Service Monitoring Method Using User Traffic Information
    Takeshita, Kei
    Soejima, Yuji
    APNOMS 2020: 2020 21ST ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2020, : 144 - 149
  • [27] Vision-speech system adapting to the user and environment for service robots
    Yoshizaki, M
    Nakamura, A
    Kuno, Y
    IROS 2003: PROCEEDINGS OF THE 2003 IEEE/RSJ INTERNATIONAL CONFERENCE ON INTELLIGENT ROBOTS AND SYSTEMS, VOLS 1-4, 2003, : 1290 - 1295
  • [28] Analysis of User Behavior in Mobile Internet Using Bipartite Network
    Zhao, Guo-feng
    Lai, Wen-jing
    Xu, Chuan
    Tang, Hong
    2012 EIGHTH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR NETWORKS (MSN 2012), 2012, : 38 - 44
  • [29] Personalized News Search in WWW: Adapting on user's behavior
    Bouras, Christos
    Poulopoulos, Vassilis
    Silintziris, Panagiotis
    2009 FOURTH INTERNATIONAL CONFERENCE ON INTERNET AND WEB APPLICATIONS AND SERVICES, 2009, : 125 - +
  • [30] An Intelligent Fighting Videogame Opponent Adapting to Behavior Patterns of the User
    Moriyama, Koichi
    Ortiz Branco, Simon Enrique
    Matsumoto, Mitsuhiro
    Fukui, Ken-ichi
    Kurihara, Satoshi
    Numao, Masayuki
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2014, E97D (04): : 842 - 851