Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors

    Receive Latest News

    Feedburner
    Share Us


    Emerging Automation Techniques for the Future Internet

    View: 326

    Website https://www.igi-global.com/publish/call-for-papers/call-details/2895 | Want to Edit it Edit Freely

    Category networkring; computuer science

    Deadline: October 31, 2017 | Date: October 31, 2017

    Venue/Country: U.S.A

    Updated: 2017-08-08 20:20:19 (GMT+9)

    Call For Papers - CFP

    CALL FOR CHAPTER PROPOSALS

    Emerging Automation Techniques for the Future Internet

    A book edited by M. Boucadair and C. Jacquenet

    Contact: mohamed.boucadairatorange.com; christian.jacquenetatorange.com

    Orange

    To be published by IGI Global: [https://tinyurl.com/y7xh743p]

    INTRODUCTION

    Service portfolios proposed by service and network operators have

    dramatically expanded over the past ten years, at the cost of extra

    complexity. The diversity and the complexity of these services have

    been raising technical challenges for many years, not only during the

    service design phase but also during the service operation phase.

    The emergence of Software-Defined Networking (SDN) techniques such as

    dynamic resource allocation schemes, as well as network function

    virtualization techniques has often been the opportunity for some

    vendors to make debatable promises about their so-called flexibility

    or their intrinsic ability to facilitate the automation of the

    service delivery procedures.

    Reality is much different. As a matter of fact, process automation

    is often restricted to dynamic configuration tasks, whose steering

    relies upon decision-making procedures that remain "manually

    declarative": the data that are used to feed the computation logic

    that will drive the execution of configuration tasks are statically

    declared. In addition, this rather embryonic automation only deals

    with tasks that remain local to a device to the detriment of a

    global, systemic view that would be able to guarantee the overall

    consistency of the actions taken by the said computation logic to

    deliver a service.

    Automation is actually far more protean: from the dynamic exposure

    and negotiation of service parameters to feedback mechanisms that are

    meant to assess that what has been allocated complies with what has

    been negotiated, the automation of service delivery and operational

    procedures relies upon a set of functional meta-blocks (dynamic

    discovery of the network, its topology, its components, dynamic

    negotiation techniques, dynamic resource allocation and policy

    enforcement schemes, autonomous back-up mechanisms, etc.) coupled

    with control loops that interact in a deterministic and sometimes

    autonomic fashion.

    The need for such automation is even more critical in the so-called

    5G networking era where (high bandwidth) services are supposed to be

    delivered on-the-fly, at the granularity of the requirements

    expressed by a single customer. In addition, the ability of an end-

    user to dynamically customize the service he/she has subscribed to as

    a function of the evolution of the service usage over time is very

    likely to distort legacy, statically-conceived, service design

    schemes: automation techniques can help addressing such new

    challenges, while facilitating dynamic service and resource

    adjustments for the sake of optimized network usage.

    Of course, automation does not come for free: besides the human

    implications that will inevitably question the role of network

    designers and administrators because of the progressive blurring of

    IT/network borders, automation is likely to dramatically impact the

    way network, CPU and storage resources are allocated and managed. In

    particular, determinism is critical for the proper operation of

    automated networking infrastructures to minimize the risk of the mad

    robot syndrome and other possible collateral effects, such as

    security and robustness implications.

    OBJECTIVE OF THE BOOK

    The book is meant to provide a detailed and comprehensive landscape

    of the automation techniques that are meant to facilitate the

    delivery of flexible, agile, customized connectivity services

    regardless of the nature of the networking environment (5G, IoT,

    legacy IP networking infrastructures).

    The book will focus on means for delivering and operating services

    over robust, new Internet architectures that combine advanced

    forwarding and routing schemes, mobility features and customer-

    adapted resource facilities (bandwidth, security, etc.).

    The book is meant to provide a detailed state-of-the-art as well as

    evolution perspectives of the set of techniques that can be used for

    automated networking purposes. In particular, the book will discuss:

    o Automated service delivery and invocation procedures by end user

    equipment (CPE, User Equipment), including automated procedures to

    undertake Fault, Configuration, Accounting, Performance and

    Security (FCAPS) functions.

    o Network bootstrapping procedures:

    Including (but not limited to) the ability to dynamically discover

    the network nodes, CPU and storage resources, the network

    topology, the network functions and their status, as well as the

    appropriate security mechanisms that are meant to provide some

    guarantees about the robustness of exchanges between network

    components and the computation logic that is at the core of

    automated service delivery and operational procedures.

    o Dynamic service parameter exposure and negotiation capabilities:

    A customer (including, but not limited to, a network API, a

    service subscriber, a 3rd party) may have the ability to

    dynamically express service requirements (from various, possibly

    combined, standpoints: quality of service, security, service

    scope, etc.) and thus negotiate with the service provider so that

    the latter can best accommodate the said requirements given a

    variety of inputs that include (but are not limited to) the amount

    of available resources, their location, the network planning

    policy, network-originated notifications, etc. The outcomes of

    such negotiation are then used by the aforementioned computation

    logic to make decisions accordingly (about resource allocation and

    policy enforcement, in particular).

    o Dynamic resource allocation and policy enforcement schemes:

    Based upon (standard, service-inferred) data models, the

    computation logic that resides at the core of the automated

    networking infrastructure dynamically derives negotiation outcomes

    into configuration tasks and policy provisioning information that

    are processed by participating components to automatically deliver

    the connectivity service subscribed by the customer.

    o Service fulfillment and assurance:

    The need for feedback mechanisms and control loops along the

    service delivery process is crucial to make sure that what has

    been delivered complies with what has been negotiated.

    o Security:

    Automated networking infrastructures raise new security challenges

    besides the aforementioned mad robot syndrome. The ability to

    provide guarantees about the clearance of a customer to design,

    negotiate, allocate, or access network resources or to make sure

    that a third party provider is entitled to modify the amount of

    resources required to deliver a service are among the numerous

    examples of security issues raised by the introduction of a high

    level of automation. A particular focus will be on automated

    detection and mitigation of denial of service attacks.

    RECOMMENDED TOPICS INCLUDE, BUT ARE NOT LIMITED TO, THE FOLLOWING:

    o Automated network discovery and setup

    o Dynamic service parameter exposure

    o Dynamic service subscription and delivery

    o Data and Information models

    o Dynamic resource allocation

    o Dynamic policy enforcement

    o Dynamic DDoS detect and automatic mitigation

    o Service discovery and dynamic negotiation

    o Security challenges for Automation

    o Service Function Chaining

    o Automation within home LANs and enterprise networks

    o Advanced network service production schemes by means of automated

    tasks and procedures

    o Automated and dynamic Interconnect design schemes

    o Automation for Internet of Things

    o Internet measurement, modeling, and visualization at large

    o CPE (Customer Premises Equipment) serviceability

    o Automated power-aware networking

    o Automatic Service Assurance and Fulfillment

    o Software-Defined Networking (SDN) & Automation

    o Network Function Virtualization (NFV) & Automation

    o Novel zero-touch Data Center architectures

    o Operation & Maintenance

    o Assessment of how Self-* (self-configuring, self-healing)

    architectures can be deployed at the Internet scale

    o Tech-eco analysis

    o Assessing performance of automation: metrics, metrology,

    benchmarking techniques

    o Regulatory aspects and human implications

    SUBMISSION PROCEDURE

    You are invited to submit to the editors a 2-page extended abstract

    of the chapter you propose. Full manuscripts will be solicited upon

    the acceptance decision based on the initial proposals. A second

    round of review of the full manuscripts will be organized before

    their final versions are produced for publication.

    The initial extended abstract must contain the following information:

    - Title

    - Full list of authors with affiliations and contact information

    - 2-page description of the chapter contents: problem statement,

    technical options, evolution perspectives, etc., along with

    the foreseen chapter organization.

    IMPORTANT DATES

    - Submission of initial extended abstract: October 31, 2017

    - Notification of acceptance: November 30, 2017

    - Submission of full manuscript: March 16, 2018

    - Return of final review: April 30, 2018

    - Submission of final version with revisions: May 18, 2018

    - Target date for publication: Q4 2018


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.