Internet DRAFT - draft-park-nmrg-ibn-network-management-srv6

draft-park-nmrg-ibn-network-management-srv6







Network Management Research Group                           J. Park, Ed.
Internet-Draft                                                   Y. Choi
Intended status: Informational                                      ETRI
Expires: 10 May 2024                                            J. Jeong
                                                 Sungkyunkwan University
                                                         7 November 2023


            Intent-Based Network Management in SRv6 network
             draft-park-nmrg-ibn-network-management-srv6-01

Abstract

   This document describes secure network management in Segment Routing
   version six (SRv6) network.  It proposes a framework empowered with
   Intent-Based Networking (IBN).  The Intent-based Network Management
   (IBNM) in this document specifies an architectural framework with
   system components and interfaces.  Also, this framework builds on
   Interface to Network Security Functions(I2NSF).

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 10 May 2024.

Copyright Notice

   Copyright (c) 2023 IETF Trust and the persons identified as the
   document authors.  All rights reserved.










Park, et al.               Expires 10 May 2024                  [Page 1]

Internet-Draft           IBN Network Management            November 2023


   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.  Code Components
   extracted from this document must include Revised BSD License text as
   described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Revised BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Terminology . . . . . . . . . . . . . . . . . . . . . . . . .   3
   3.  Intent based Network Management in SRv6 Network . . . . . . .   4
     3.1.  Components with IBNM Framework in SRv6 Network  . . . . .   5
     3.2.  Interfaces for the IBNM Framework . . . . . . . . . . . .   6
   4.  Network Policy Translation  . . . . . . . . . . . . . . . . .   7
   5.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   7
   6.  Security Considerations . . . . . . . . . . . . . . . . . . .   7
   7.  References  . . . . . . . . . . . . . . . . . . . . . . . . .   7
     7.1.  Normative References  . . . . . . . . . . . . . . . . . .   7
     7.2.  Informative References  . . . . . . . . . . . . . . . . .   8
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  11

1.  Introduction

   Interface to Network Security Functions (I2NSF) defines a framework
   and interfaces for interacting with Network Security Functions (NSFs)
   [RFC8192][RFC8329].  Note that an NSF is defined as software that
   provides a set of security-related services, such as (i) detecting
   unwanted activity, (ii) blocking or mitigating the effect of such
   unwanted activity in order to fulfill service requirements, and (iii)
   supporting communication stream integrity and confidentiality
   [RFC8329].  Th e NSF can be implemented as a Virtual Network Function
   (VNF) in a Network Functions Virtualization (NFV) environment
   [ETSI-NFV][I-D.ietf-i2nsf-applicability].

   The term "intent" is defined as "an abstract, high-level policy used
   to operate the network" in the context of autonomic networks
   [RFC7575].  According to this definition, an intent is a specific
   type of policy provided by a user to provide guidance to the
   autonomic network that would otherwise operate without human
   intervention.

   Intent-Based Networking (IBN) Management (IBNM) aims to lead towards
   networks that are fundamentally simpler to manage and operate,
   requiring only minimal outside intervention.  The IBNM supports a
   closed-loop network control architecture that can adapt to the



Park, et al.               Expires 10 May 2024                  [Page 2]

Internet-Draft           IBN Network Management            November 2023


   current status of a target network by collecting and analyzing
   monitoring data from Network Service Functions (NSFs) of I2NSF
   framework.  NSFs can be either Virtual Network Functions (VNFs) or
   Physical Network Functions (PNFs) in cloud and edge computing
   environments.

   Segment Routing (SR) [RFC8402] allows a node to steer a packet flow
   along any path.  The headend (i.e., ingress router) is a node where
   the instructions for source routing (i.e., segments) are written into
   the packet.  It hence becomes the starting node for a specific
   segment routing path.  Intermediate per-path states are eliminated
   thanks to source routing.  [RFC8754] and [RFC8986] describe the same
   for Segment Routing over IPv6 (SRv6) with the use of the Segment
   Routing Header (SRH).

   Therefore, the instructions for source routing is made by a Segment
   Routing Policy (SR Policy) [RFC8402].  The SR policy is an ordered
   list of segments and come from the Intent, which is given by users
   (i.e., network operators).  According to the Intent, IBNM will
   support several funtionalities.

2.  Terminology

   This document uses the terminology described in [RFC8329],
   [I-D.ietf-i2nsf-applicability],
   [I-D.jeong-i2nsf-security-management-automation], and
   [I-D.jeong-nmrg-ibn-network-management-automation].  In addition, the
   following terms are defined below:

   *  Autonomous Network Management (ANM): It means that an intent from
      a user (or administrator or network operator) is well-enforced in
      a target SRv6 network.  The intent can be aligned with high-level
      network policy and then high-level network policy can be
      translated into the corresponding low-level network policy
      (including SRv6 Policy) by a network policy translator and
      dispatched to appropriate NSFs.  Through the monitoring of the
      NSFs, the activity and performace of the NSFs is monitored and
      analyzed whether or not NSFs are operating well according to the
      intent of the users.  If needed, the network rules of the low-
      level network and SRv6 policy are augmented or new network rules
      are generated and configured to appropriate NSFs.

   *  Network Policy Translation (NPT): It means that a high-level
      network policy is translated to a low-level network policy
      (including SRv6 policy) that can be understood and configured by
      an NSF for autonomous network services, such as self-
      configuration, self-optimization, self-healing, and self-
      protection.



Park, et al.               Expires 10 May 2024                  [Page 3]

Internet-Draft           IBN Network Management            November 2023


   *  Feedback-Based Network Management (FNM): It means that a network
      service in SRv6 network is evolved by updating a network policy
      (i.e., a set of network rules) and adding new network rules for
      resolving network problems, which were detected by monitoring and
      analzing data from NSFs.

      +-------------+                   +-----------------------------+
      |  IBN User   |                   | Global Distributed Database |
      +-------------+                   +-----------------------------+
             ^                                                     ^
             | Consumer-Facing                    Software Update  |
             | Interface                            Interface (Up) |
             v                                                     v
   +-------------------+     Registration     +-----------------------+
   |   IBN Controller  |<-------------------->|  Vendor's Mgmt System |
   +-------------------+      Interface       +-----------------------+
             ^      ^                                            ^
             |      |                  Software Update Interface |
             |      |                                     (Down) |
             |      |   Analytics Interface   +----------------+ |
             |      +------------------------>|  IBN Analyzer  | |
             |                                +----------------+ |
             | NSF-Facing Interface                   ^          |
             |                                        |          |
             |                  +---------------------+          |
             |                  |  Monitoring Interface          |
             |                  |                                |
   +---------+------------------+--------------------------------+----+
   |         v                  v         SRv6 Nodes             v    |
   |  +---------------+  +---------------+         +---------------+  |
   |  |     NSF-1     |--|     NSF-2     | ....... |     NSF-n     |  |
   |  |(Policy Control|  | (Monitoring   |         | (Application  |  |
   |  | Function, PCF)|  |  Function, MF)|         | Function, AF) |  |
   |  +---------------+  +---------------+         +---------------+  |
   +------------------------------------------------------------------+

         Figure 1: Intent based Network Management in SRv6 Network

3.  Intent based Network Management in SRv6 Network

   This section describes an IBNM framework in SRv6 network.  Note that
   this IBNM Framework is based on the Framework for Interface to
   Network Security Functions (I2NSF)
   [RFC8329][I-D.jeong-i2nsf-security-management-automation].  As shown
   in Figure 1, an IBN User can use network functions by delivering
   high-level network intents, which specify network requirements that
   the IBNM User wants to enforce, to the IBN Controller via the
   Consumer-Facing Interface (CFI).



Park, et al.               Expires 10 May 2024                  [Page 4]

Internet-Draft           IBN Network Management            November 2023


3.1.  Components with IBNM Framework in SRv6 Network

   The following are the system components for the IBNM framework in
   SRv6 network.

   *  IBN User: An entity (e.g., End User or Network Operator) that
      delivers a high-level network policy (including SRv6 policy) to
      Security Controller.  It is assumed that (i) an intent in a
      natural language (e.g., English) can be translated into a high-
      level network policy through a Natural Language Processing (called
      NLP) technique (e.g., Lumi [USENIX-ATC-Lumi]) (ii) an intent as a
      network service (e.g., self-configuration, optimization, and
      healing) can be also translated into a high-level network policy.

   *  IBN Controller: An entity that controls and manages other system
      components in the IBNM framework.  It translates a high-level
      network policy into the corresponding low-level network policy and
      selects appropriate NSFs to execute the network rules of the low-
      level network policy.  And then these NSFs are distributed and
      enabled into SRv6 nodes according to SRv6 policy (i.e., list of
      source routing).

   *  Vendor's Management System (VMS): An entity that provides an image
      of of a virtualized NSF for a network service to the IBNM
      framework, registers the capability and access information of an
      NSF with IBN Controller, and downloads NSFs into appropriate SRv6
      nodes.  These downloaded NSFs will be updated dynamically if
      needed but is controlled by IBN controller.  These virtualized
      NSFs are managed through the cloud-based distribed database.
      Also, this dynamic downloading NSFs could be realized by using
      Software Updates for Internet of Things (SUIT) framework
      [RFC9019][RFC9124].

   *  Network Service Function (NSF): An entity that is a Virtual
      Network Function (called VNF), Physical Network Function (called
      PNF) and Container Network Function (CNF), which is also called
      Cloud-native Network Function, for a autonomous network service.

   *  IBN Analyzer: An entity that collects monitoring data from NSFs
      and analyzes such data for checking the activity and performance
      of the NSFs using machine learning techniques (e.g., Deep Learning
      [Deep-Learning]).  If there is a suspicious network problem (e.g.,
      traffic congestion and QoS degradation) for the target network or
      NSF, IBN Analyzer delivers a report of the augmentation or
      generation of network rules to IBN Controller.






Park, et al.               Expires 10 May 2024                  [Page 5]

Internet-Draft           IBN Network Management            November 2023


   For IBN-based network services with Feedback-Based Network Management
   (FNM), IBN Analyzer is a key component for the IBNM framework
   [RFC9315] to collect monitoring data from NSFs and analyzing the
   monitoring data.  In here, SRv6 is used to distinguish the monitoring
   data.  Ingress node (i.e., Headend) in SRv6 domain adds monitoring
   information (e.g., intent and monitoring tag) into SRv6 headers.  And
   then, intermediate nodes monitor and analyze IPv6 packets with
   monitoring information.  The actual implementation of the analysis of
   monitoring data is out of the scope of this document.

3.2.  Interfaces for the IBNM Framework

   The following are the interfaces for the IBNM framework.  Note that
   the interfaces can be modeled with YANG [RFC6020] and network
   policies are delivered through either RESTCONF [RFC8040] or NETCONF
   [RFC6241].  In addition, REST API [REST] can be supported for those
   software update interfaces.

   *  Consumer-Facing Interface (CFI): An interface between IBN User and
      IBN Controller for the delivery of a high-level network policy or
      a intent [I-D.ietf-i2nsf-consumer-facing-interface-dm].

   *  NSF-Facing Interface (NFI): An interface between IBN Controller
      and an NSF for the delivery of a low-level network policy
      [I-D.ietf-i2nsf-nsf-facing-interface-dm].

   *  Registration Interface (RI): An interface between a VMS and IBN
      Controller for the registration of an NSF's capability and access
      information with the IBN Controller or the query of an NSF for a
      required low-level network policy
      [I-D.ietf-i2nsf-registration-interface-dm].

   *  Software Update Interface (Up) (SUI-U): An interface between a VMS
      and global distribed database for NSF management.

   *  Software Update Interface (Down) (SUI-D): An interface between a
      VMS and a SRv6 node for delivery of a NSF.  The NSF is just
      downloaded and does not work.  After the command of IBN Controller
      through NFI, it works.

   *  Monitoring Interface (MI): An interface between an NSF and IBN
      Analyzer for collecting monitoring data from an NSF to check the
      activity and performance of an NSF for a possible network problem
      [I-D.ietf-i2nsf-nsf-monitoring-data-model].  In here, IPv6 packets
      with monitoring information in SRv6 heeder is only collected.






Park, et al.               Expires 10 May 2024                  [Page 6]

Internet-Draft           IBN Network Management            November 2023


   *  Analytics Interface (AI): An interface between IBN Analyzer and
      IBN Controller for the delivery of an analytics report of the
      augmentation or generation of network rules to IBN Controller,
      which lets IBN Controller apply the report for network rules to
      its network policy management.

   For IBN-based network services with FSM, Analytics Interface is a key
   interface in the IBNM framework to deliver an analytics report of the
   augmentation or generation of network rules to IBN Controller through
   the analysis of the monitoring data from NSFs.  For analyzing, user's
   intent of monitoring information in SRv6 header will compare with
   just monitoring data from NSFs.

4.  Network Policy Translation

   To facilitate Network Policy Translation (NPT), IBN Controller needs
   to have a network policy translator that performs the translation of
   a high-level network policy into the corresponding low-level network
   policy (i.e.  SRv6 policy [RFC9256]).  For the automatic NPT
   services, the IBN framework needs to bridge a high-level YANG data
   model and a low-level YANG data model in an automatic manner
   [I-D.ietf-spring-sr-policy-yang],
   [I-D.yang-i2nsf-security-policy-translation].  Note that a high-level
   YANG data model is for the IBN Consumer-Facing Interface, and a low-
   level YANG data model is for the IBN NSF-Facing Interface.

5.  IANA Considerations

   This document does not require any IANA actions.

6.  Security Considerations

   The same security considerations for the IBN framework [RFC8329] are
   applicable to this document.

7.  References

7.1.  Normative References

   [RFC6020]  Bjorklund, M., Ed., "YANG - A Data Modeling Language for
              the Network Configuration Protocol (NETCONF)", RFC 6020,
              DOI 10.17487/RFC6020, October 2010,
              <https://www.rfc-editor.org/info/rfc6020>.

   [RFC6241]  Enns, R., Ed., Bjorklund, M., Ed., Schoenwaelder, J., Ed.,
              and A. Bierman, Ed., "Network Configuration Protocol
              (NETCONF)", RFC 6241, DOI 10.17487/RFC6241, June 2011,
              <https://www.rfc-editor.org/info/rfc6241>.



Park, et al.               Expires 10 May 2024                  [Page 7]

Internet-Draft           IBN Network Management            November 2023


   [RFC8040]  Bierman, A., Bjorklund, M., and K. Watsen, "RESTCONF
              Protocol", RFC 8040, DOI 10.17487/RFC8040, January 2017,
              <https://www.rfc-editor.org/info/rfc8040>.

   [RFC8329]  Lopez, D., Lopez, E., Dunbar, L., Strassner, J., and R.
              Kumar, "Framework for Interface to Network Security
              Functions", RFC 8329, DOI 10.17487/RFC8329, February 2018,
              <https://www.rfc-editor.org/info/rfc8329>.

   [RFC9315]  Clemm, A., Ciavaglia, L., Granville, L. Z., and J.
              Tantsura, "Intent-Based Networking - Concepts and
              Definitions", RFC 9315, DOI 10.17487/RFC9315, October
              2022, <https://www.rfc-editor.org/info/rfc9315>.

   [RFC7575]  Behringer, M., Pritikin, M., Bjarnason, S., Clemm, A.,
              Carpenter, B., Jiang, S., and L. Ciavaglia, "Autonomic
              Networking: Definitions and Design Goals", RFC 7575,
              DOI 10.17487/RFC7575, June 2015,
              <https://www.rfc-editor.org/info/rfc7575>.

   [RFC8192]  Hares, S., Lopez, D., Zarny, M., Jacquenet, C., Kumar, R.,
              and J. Jeong, "Interface to Network Security Functions
              (I2NSF): Problem Statement and Use Cases", RFC 8192,
              DOI 10.17487/RFC8192, July 2017,
              <https://www.rfc-editor.org/info/rfc8192>.

   [RFC8402]  Filsfils, C., Ed., Previdi, S., Ed., Ginsberg, L.,
              Decraene, B., Litkowski, S., and R. Shakir, "Segment
              Routing Architecture", RFC 8402, DOI 10.17487/RFC8402,
              July 2018, <https://www.rfc-editor.org/info/rfc8402>.

   [RFC8754]  Filsfils, C., Ed., Dukes, D., Ed., Previdi, S., Leddy, J.,
              Matsushima, S., and D. Voyer, "IPv6 Segment Routing Header
              (SRH)", RFC 8754, DOI 10.17487/RFC8754, March 2020,
              <https://www.rfc-editor.org/info/rfc8754>.

   [RFC8986]  Filsfils, C., Ed., Camarillo, P., Ed., Leddy, J., Voyer,
              D., Matsushima, S., and Z. Li, "Segment Routing over IPv6
              (SRv6) Network Programming", RFC 8986,
              DOI 10.17487/RFC8986, February 2021,
              <https://www.rfc-editor.org/info/rfc8986>.

   [RFC9256]  Filsfils, C., Talaulikar, K., Ed., Voyer, D., Bogdanov,
              A., and P. Mattes, "Segment Routing Policy Architecture",
              RFC 9256, DOI 10.17487/RFC9256, July 2022,
              <https://www.rfc-editor.org/info/rfc9256>.

7.2.  Informative References



Park, et al.               Expires 10 May 2024                  [Page 8]

Internet-Draft           IBN Network Management            November 2023


   [I-D.ietf-i2nsf-consumer-facing-interface-dm]
              Jeong, J. P., Chung, C., Ahn, T., Kumar, R., and S. Hares,
              "I2NSF Consumer-Facing Interface YANG Data Model", Work in
              Progress, Internet-Draft, draft-ietf-i2nsf-consumer-
              facing-interface-dm-31, 15 May 2023,
              <https://datatracker.ietf.org/doc/html/draft-ietf-i2nsf-
              consumer-facing-interface-dm-31>.

   [I-D.ietf-i2nsf-nsf-facing-interface-dm]
              Kim, J. T., Jeong, J. P., Jung-Soo, J., Hares, S., and Q.
              Lin, "I2NSF Network Security Function-Facing Interface
              YANG Data Model", Work in Progress, Internet-Draft, draft-
              ietf-i2nsf-nsf-facing-interface-dm-29, 1 June 2022,
              <https://datatracker.ietf.org/doc/html/draft-ietf-i2nsf-
              nsf-facing-interface-dm-29>.

   [I-D.ietf-i2nsf-registration-interface-dm]
              Hyun, S., Jeong, J. P., Roh, T., Wi, S., and J. Jung-Soo,
              "I2NSF Registration Interface YANG Data Model for NSF
              Capability Registration", Work in Progress, Internet-
              Draft, draft-ietf-i2nsf-registration-interface-dm-26, 10
              May 2023, <https://datatracker.ietf.org/doc/html/draft-
              ietf-i2nsf-registration-interface-dm-26>.

   [I-D.ietf-i2nsf-nsf-monitoring-data-model]
              Jeong, J. P., Lingga, P., Hares, S., Xia, L., and H.
              Birkholz, "I2NSF NSF Monitoring Interface YANG Data
              Model", Work in Progress, Internet-Draft, draft-ietf-
              i2nsf-nsf-monitoring-data-model-20, 1 June 2022,
              <https://datatracker.ietf.org/doc/html/draft-ietf-i2nsf-
              nsf-monitoring-data-model-20>.

   [I-D.ietf-i2nsf-applicability]
              Jeong, J. P., Hyun, S., Ahn, T., Hares, S., and D. Lopez,
              "Applicability of Interfaces to Network Security Functions
              to Network-Based Security Services", Work in Progress,
              Internet-Draft, draft-ietf-i2nsf-applicability-18, 16
              September 2019, <https://datatracker.ietf.org/doc/html/
              draft-ietf-i2nsf-applicability-18>.

   [I-D.jeong-i2nsf-security-management-automation]
              Jeong, J. P., Lingga, P., Jung-Soo, J., Lopez, D., and S.
              Hares, "Security Management Automation of Cloud-Based
              Security Services in I2NSF Framework", Work in Progress,
              Internet-Draft, draft-jeong-i2nsf-security-management-
              automation-06, 24 July 2023,
              <https://datatracker.ietf.org/doc/html/draft-jeong-i2nsf-
              security-management-automation-06>.



Park, et al.               Expires 10 May 2024                  [Page 9]

Internet-Draft           IBN Network Management            November 2023


   [I-D.yang-i2nsf-security-policy-translation]
              Jeong, J. P., Lingga, P., and J. Yang, "Guidelines for
              Security Policy Translation in Interface to Network
              Security Functions", Work in Progress, Internet-Draft,
              draft-yang-i2nsf-security-policy-translation-15, 24 July
              2023, <https://datatracker.ietf.org/doc/html/draft-yang-
              i2nsf-security-policy-translation-15>.

   [I-D.ietf-spring-sr-policy-yang]
              Raza, S., Sawaya, R., Shunwan, Z., Voyer, D., Durrani, M.,
              Matsushima, S., and V. P. Beeram, "YANG Data Model for
              Segment Routing Policy", Work in Progress, Internet-Draft,
              draft-ietf-spring-sr-policy-yang-02, 23 September 2022,
              <https://datatracker.ietf.org/doc/html/draft-ietf-spring-
              sr-policy-yang-02>.

   [RFC9019]  Moran, B., Tschofenig, H., Brown, D., and M. Meriac, "A
              Firmware Update Architecture for Internet of Things",
              RFC 9019, DOI 10.17487/RFC9019, April 2021,
              <https://www.rfc-editor.org/info/rfc9019>.

   [RFC9124]  Moran, B., Tschofenig, H., and H. Birkholz, "A Manifest
              Information Model for Firmware Updates in Internet of
              Things (IoT) Devices", RFC 9124, DOI 10.17487/RFC9124,
              January 2022, <https://www.rfc-editor.org/info/rfc9124>.

   [I-D.jeong-nmrg-ibn-network-management-automation]
              Jeong, J. P., Ahn, Y., Kim, Y., and J. Jung-Soo, "Intent-
              Based Network Management Automation in 5G Networks", Work
              in Progress, Internet-Draft, draft-jeong-nmrg-ibn-network-
              management-automation-03, 6 November 2023,
              <https://datatracker.ietf.org/doc/html/draft-jeong-nmrg-
              ibn-network-management-automation-03>.

   [ETSI-NFV] "Network Functions Virtualisation (NFV); Architectural
              Framework", Available:
              https://www.etsi.org/deliver/etsi_gs/
              nfv/001_099/002/01.02.01_60/gs_nfv002v010201p.pdf,
              December 2014.

   [USENIX-ATC-Lumi]
              Jacobs, A., Pfitscher, R., Ribeiro, R., Ferreira, R.,
              Granville, L., Willinger, W., and S. Rao, "Hey, Lumi!
              Using Natural Language for Intent-Based Network
              Management", USENIX Annual Technical Conference,
              Available:
              https://www.usenix.org/conference/atc21/presentation/
              jacobs, July 2021.



Park, et al.               Expires 10 May 2024                 [Page 10]

Internet-Draft           IBN Network Management            November 2023


   [REST]     Fielding, R. and R. Taylor, "Principled Design of the
              Modern Web Architecture", ACM Transactions on Internet
              Technology, Vol. 2, Issue 2,,
              Available: https://dl.acm.org/doi/10.1145/514183.514185,
              May 2002.

   [Deep-Learning]
              Goodfellow, I., Bengio, Y., and A. Courville, "Deep
              Learning", Publisher: The MIT Press,
              URL: https://www.deeplearningbook.org/, November 2016.

Authors' Addresses

   Jungsoo Park (editor)
   Electronics and Telecommunications Research Institute
   218 Gajeongno, Yuseung-gu
   Daejeon
   34129
   South Korea
   Phone: +82 42 860 6514
   Email: pjs@etri.re.kr


   Yunchul Choi
   Electronics and Telecommunications Research Institute
   218 Gajeongno, Yuseung-gu
   Daejeon
   34129
   South Korea
   Phone: +82 42 860 5978
   Email: cyc79@etri.re.kr


   Jaehoon Paul Jeong
   Department of Computer Science and Engineering
   Sungkyunkwan University
   2066 Seobu-Ro, Jangan-Gu
   Suwon
   Gyeonggi-Do
   16419
   South Korea
   Phone: +82 31 299 4957
   Email: pauljeong@skku.edu
   URI:   http://iotlab.skku.edu/people-jaehoon-jeong.php







Park, et al.               Expires 10 May 2024                 [Page 11]