Pub Date : 2022-06-27DOI: 10.1109/NetSoft54395.2022.9844069
Alireza Mohammadpour, C. Lombardo, R. Bolla, R. Bruschi, F. Davoli, Lorenzo Ivaldi
In order to fulfill the stringent requirements of 5G applications, measuring the performance of the VNFs composing the network slices is crucial to identify potential bottlenecks of the networks. However, since the VNF behavior is time varying and strongly depends on the infrastructure and hosting execution environment, the traditional traffic generators are not suited for the evaluation as their overhead, both in terms of deployment time and code complexity, may affect the results to the point of corruption. In order to overcome this issue, this paper presents a software traffic generator, based on TRex and executed in a VNF, which leverages on an automation framework to provide zero-touch as-a-Service active monitoring. Results show that the impact of this solution on the measured performance is negligible in terms of deployment time as well as required input lines.
{"title":"A Zero-Touch as-a-Service Active Monitoring Framework for Virtualized Network Environments","authors":"Alireza Mohammadpour, C. Lombardo, R. Bolla, R. Bruschi, F. Davoli, Lorenzo Ivaldi","doi":"10.1109/NetSoft54395.2022.9844069","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844069","url":null,"abstract":"In order to fulfill the stringent requirements of 5G applications, measuring the performance of the VNFs composing the network slices is crucial to identify potential bottlenecks of the networks. However, since the VNF behavior is time varying and strongly depends on the infrastructure and hosting execution environment, the traditional traffic generators are not suited for the evaluation as their overhead, both in terms of deployment time and code complexity, may affect the results to the point of corruption. In order to overcome this issue, this paper presents a software traffic generator, based on TRex and executed in a VNF, which leverages on an automation framework to provide zero-touch as-a-Service active monitoring. Results show that the impact of this solution on the measured performance is negligible in terms of deployment time as well as required input lines.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123058477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-27DOI: 10.1109/NetSoft54395.2022.9844039
R. Bolla, R. Bruschi, A. Carrega, F. Davoli, C. Lombardo
Beside increasing flexibility and programmability, the current network “softwarization” trend is believed to be beneficial also in respect of energy efficiency, owing to the consolidation of resources made possible by virtualized networking components. However, the widespread use of general-purpose hardware may jeopardize energy saving, unless proper control strategies are put in operation. In this context, the paper addresses a “smart sleeping” control problem, where computing resources in multi-core processors executing network functions are modelled as multi-server queues, and the number of active processing units (either physical or virtual) can be dynamically adjusted by parametric control over a time scale compatible with the long-term dynamics of the traffic flows that require processing. We show that, on average, up to 25% of processing capacity of a network node can be turned off in the presence of bursty traffic with low load without significantly affecting packet latency.
{"title":"Trading off Power Consumption and Delay in the Execution of Network Functions by Dynamic Activation of Processing Units","authors":"R. Bolla, R. Bruschi, A. Carrega, F. Davoli, C. Lombardo","doi":"10.1109/NetSoft54395.2022.9844039","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844039","url":null,"abstract":"Beside increasing flexibility and programmability, the current network “softwarization” trend is believed to be beneficial also in respect of energy efficiency, owing to the consolidation of resources made possible by virtualized networking components. However, the widespread use of general-purpose hardware may jeopardize energy saving, unless proper control strategies are put in operation. In this context, the paper addresses a “smart sleeping” control problem, where computing resources in multi-core processors executing network functions are modelled as multi-server queues, and the number of active processing units (either physical or virtual) can be dynamically adjusted by parametric control over a time scale compatible with the long-term dynamics of the traffic flows that require processing. We show that, on average, up to 25% of processing capacity of a network node can be turned off in the presence of bursty traffic with low load without significantly affecting packet latency.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134397669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-27DOI: 10.1109/NetSoft54395.2022.9844114
Ikuo Otani, Kei Fujimoto, A. Shiraga
In a virtual radio access network (vRAN), accelerators are often used in general purpose servers. They can achieve very high performance in signal processing but at the same time consume high power. If accelerators can be shared by multiple vRAN applications, power consumption can be saved.In this paper, we proposed a method to satisfy five requirements in sharing vRAN accelerators by multiple applications: (a) accelerator sharing without application modification, (b) dynamic accelerator resource increasing and decreasing, (c) no need to consume accelerator resources to enable accelerator sharing, (d) minimum increase in power to enable accelerator sharing, and (e) minimum decrease in performance to enable accelerator sharing. Through pre-evaluation, it became clear that proxy architecture can achieve requirements (a)–(c), but it also causes power to increase. To reduce overheads, we proposed a proxy method in which the proxy itself and vRAN application can sleep as much as possible. We showed that this architecture can reduce power as low as a raw accelerator system without significantly degrading performance, which means accelerator sharing is feasible.
{"title":"Accelerator-Resource Sharing with Offload-Mediated Proxy for vRAN","authors":"Ikuo Otani, Kei Fujimoto, A. Shiraga","doi":"10.1109/NetSoft54395.2022.9844114","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844114","url":null,"abstract":"In a virtual radio access network (vRAN), accelerators are often used in general purpose servers. They can achieve very high performance in signal processing but at the same time consume high power. If accelerators can be shared by multiple vRAN applications, power consumption can be saved.In this paper, we proposed a method to satisfy five requirements in sharing vRAN accelerators by multiple applications: (a) accelerator sharing without application modification, (b) dynamic accelerator resource increasing and decreasing, (c) no need to consume accelerator resources to enable accelerator sharing, (d) minimum increase in power to enable accelerator sharing, and (e) minimum decrease in performance to enable accelerator sharing. Through pre-evaluation, it became clear that proxy architecture can achieve requirements (a)–(c), but it also causes power to increase. To reduce overheads, we proposed a proxy method in which the proxy itself and vRAN application can sleep as much as possible. We showed that this architecture can reduce power as low as a raw accelerator system without significantly degrading performance, which means accelerator sharing is feasible.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116729161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-27DOI: 10.1109/NetSoft54395.2022.9844070
Kento Yokouchi, Fujun He, E. Oki
This paper proposes a backup resource allocation model with two-stage probabilistic protection to minimize the total required backup capacity for multiple simultaneous failures of physical machines (PMs). Probabilistic protection ensures that the probability that the PM used for backup fails to backup due to lack of computing capacity does not exceed a given survivability parameter. The proposed model protects the primary virtual machines by allocating computing capacity to backup PMs with probabilistic protection. Since it is uncertain which primary PMs fail, we apply robust optimization to the probabilistic protection. By using a table that takes into account the survivability parameter and the failure probability of PMs, this proposed model is formulated as a mixed integer linear programming problem. The proposed model extends the probabilistic protection to two stages; the VMs that fail to be protected in the first stage are protected in the second stage to achieve the probabilistic protection with the final survivability parameter. This model can reduce the total required backup capacity compared to the conventional model with one-stage probabilistic protection.
{"title":"Backup Resource Allocation Model with Two-Stage Probabilistic Protection","authors":"Kento Yokouchi, Fujun He, E. Oki","doi":"10.1109/NetSoft54395.2022.9844070","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844070","url":null,"abstract":"This paper proposes a backup resource allocation model with two-stage probabilistic protection to minimize the total required backup capacity for multiple simultaneous failures of physical machines (PMs). Probabilistic protection ensures that the probability that the PM used for backup fails to backup due to lack of computing capacity does not exceed a given survivability parameter. The proposed model protects the primary virtual machines by allocating computing capacity to backup PMs with probabilistic protection. Since it is uncertain which primary PMs fail, we apply robust optimization to the probabilistic protection. By using a table that takes into account the survivability parameter and the failure probability of PMs, this proposed model is formulated as a mixed integer linear programming problem. The proposed model extends the probabilistic protection to two stages; the VMs that fail to be protected in the first stage are protected in the second stage to achieve the probabilistic protection with the final survivability parameter. This model can reduce the total required backup capacity compared to the conventional model with one-stage probabilistic protection.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123543726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-27DOI: 10.1109/NetSoft54395.2022.9844040
Hichem Magnouche, G. Doyen, C. Prodhon
The evolution of the Internet tends toward ever requiring lower latency services. Cloud robotics or drone piloting are service use-cases in which the latency of traffic cannot exceed a few milliseconds. Reducing the latency can be achieved through several means, and micro-services deployed over virtual infrastructures appears as a promising way by enabling service chain reductions, micro-function mutualization and parallelism. However, the placement and routing of such components appears as an harder task to achieve as compared to monolithic approaches of the state of the art. Consequently, we propose in this paper a comprehensive optimization model in charge of placing micro-services in a virtualized network infrastructure, under ultra-low latency constraints while preserving resource consumption. By challenging our model with several realistic scenarios in terms of topology and service function chains (SFC), we demonstrate to what extent it improves the overall performance of SFC by especially minimizing the gap between the expected latency and the actual one, as compared to several competitors, thus making it a well-fitted approach for ultra-low latency services.
{"title":"Leveraging Micro-Services for Ultra-Low Latency: An optimization Model for Service Function Chains Placement","authors":"Hichem Magnouche, G. Doyen, C. Prodhon","doi":"10.1109/NetSoft54395.2022.9844040","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844040","url":null,"abstract":"The evolution of the Internet tends toward ever requiring lower latency services. Cloud robotics or drone piloting are service use-cases in which the latency of traffic cannot exceed a few milliseconds. Reducing the latency can be achieved through several means, and micro-services deployed over virtual infrastructures appears as a promising way by enabling service chain reductions, micro-function mutualization and parallelism. However, the placement and routing of such components appears as an harder task to achieve as compared to monolithic approaches of the state of the art. Consequently, we propose in this paper a comprehensive optimization model in charge of placing micro-services in a virtualized network infrastructure, under ultra-low latency constraints while preserving resource consumption. By challenging our model with several realistic scenarios in terms of topology and service function chains (SFC), we demonstrate to what extent it improves the overall performance of SFC by especially minimizing the gap between the expected latency and the actual one, as compared to several competitors, thus making it a well-fitted approach for ultra-low latency services.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129927942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-27DOI: 10.1109/NetSoft54395.2022.9844055
R. Sedar, Charalampos Kalalas, J. Alonso-Zarate, F. V. Gallego
The transformative Internet-of-Vehicles (IoV) paradigm comes inadvertently with challenges which involve security vulnerabilities and privacy breaches. In this context, denial-of-service (DoS) attacks may perniciously affect the normal operation of IoV systems by causing extensive periods of network unavailability where legitimate vehicles are prevented from accessing vehicular services. In this paper, we offer an in-depth vulnerability assessment of 5G-enabled IoV systems when DoS attack variants are launched at multiple network domains. We further evaluate the resilience of an IoV-tailored authentication mechanism against DoS attacks under various configurations. A data-driven detection scheme is also proposed to address DoS variants in the radio access network, which take the form of false data injection attacks on the exchanged vehicular information. Our performance assessment with the aid of an open-source dataset reveals that the proposed scheme is able to accurately detect DoS traffic originated from malicious vehicles.
{"title":"Multi-domain Denial-of-Service Attacks in Internet-of-Vehicles: Vulnerability Insights and Detection Performance","authors":"R. Sedar, Charalampos Kalalas, J. Alonso-Zarate, F. V. Gallego","doi":"10.1109/NetSoft54395.2022.9844055","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844055","url":null,"abstract":"The transformative Internet-of-Vehicles (IoV) paradigm comes inadvertently with challenges which involve security vulnerabilities and privacy breaches. In this context, denial-of-service (DoS) attacks may perniciously affect the normal operation of IoV systems by causing extensive periods of network unavailability where legitimate vehicles are prevented from accessing vehicular services. In this paper, we offer an in-depth vulnerability assessment of 5G-enabled IoV systems when DoS attack variants are launched at multiple network domains. We further evaluate the resilience of an IoV-tailored authentication mechanism against DoS attacks under various configurations. A data-driven detection scheme is also proposed to address DoS variants in the radio access network, which take the form of false data injection attacks on the exchanged vehicular information. Our performance assessment with the aid of an open-source dataset reveals that the proposed scheme is able to accurately detect DoS traffic originated from malicious vehicles.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"29 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122598099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-27DOI: 10.1109/NetSoft54395.2022.9844067
Jacob Steadman, Sandra Scott-Hayward
Data breaches linked to individual and company information are exposed on an almost daily basis. With increasing media attention and visibility of this security issue, users are becoming more aware of privacy concerns related to their activity on the Internet. Fundamental to the operation of the Internet is the Domain Name System (DNS), which translates domain names to IP addresses enabling easy web browsing. Encrypted DNS has become popular to increase user privacy by ensuring that activity transmitted over domain queries is not visible to intermediary network devices between the client and the DNS endpoint. Unfortunately, this undermines the security services designed to analyse DNS traffic for the detection of exploitation of DNS for use as a covert communication and data exfiltration channel. In this work, we propose a solution, DoHxP, to enable protection of DNS over HTTPS (DoH) traffic from data exfiltration without compromising user privacy. Our results show that DoHxP successfully prevents up to 99.88% of the malicious DoH traffic from being transmitted outside of the network.
{"title":"Detecting Data Exfiltration over Encrypted DNS","authors":"Jacob Steadman, Sandra Scott-Hayward","doi":"10.1109/NetSoft54395.2022.9844067","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844067","url":null,"abstract":"Data breaches linked to individual and company information are exposed on an almost daily basis. With increasing media attention and visibility of this security issue, users are becoming more aware of privacy concerns related to their activity on the Internet. Fundamental to the operation of the Internet is the Domain Name System (DNS), which translates domain names to IP addresses enabling easy web browsing. Encrypted DNS has become popular to increase user privacy by ensuring that activity transmitted over domain queries is not visible to intermediary network devices between the client and the DNS endpoint. Unfortunately, this undermines the security services designed to analyse DNS traffic for the detection of exploitation of DNS for use as a covert communication and data exfiltration channel. In this work, we propose a solution, DoHxP, to enable protection of DNS over HTTPS (DoH) traffic from data exfiltration without compromising user privacy. Our results show that DoHxP successfully prevents up to 99.88% of the malicious DoH traffic from being transmitted outside of the network.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"3 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120821241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-27DOI: 10.1109/NetSoft54395.2022.9844104
Daniel Lukaszewski, G. Xie
We demonstrate a system prototype of a new software framework [1] for orchestration and continuous management of protocol customization of selected devices in an enterprise or data-center network. The prototype mainly consists of a network-wide customization orchestrator (NCO) that deploys sample customization modules to a pair of client-server hosts for insertion between the application and transport layers, termed Layer 4.5, and a device customization agent (DCA) installed at each host. In this demo, we show how our system can be used to customize multiple protocols on a client to match different network and server requirements.
{"title":"Demo: Towards Software Defined Layer 4.5 Customization","authors":"Daniel Lukaszewski, G. Xie","doi":"10.1109/NetSoft54395.2022.9844104","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844104","url":null,"abstract":"We demonstrate a system prototype of a new software framework [1] for orchestration and continuous management of protocol customization of selected devices in an enterprise or data-center network. The prototype mainly consists of a network-wide customization orchestrator (NCO) that deploys sample customization modules to a pair of client-server hosts for insertion between the application and transport layers, termed Layer 4.5, and a device customization agent (DCA) installed at each host. In this demo, we show how our system can be used to customize multiple protocols on a client to match different network and server requirements.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129123500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-27DOI: 10.1109/NetSoft54395.2022.9844054
P. Alcock, Ben Simms, Will Fantom, Charalampos Rotsos, N. Race
Intent-based networking (IBN) systems have become the de-facto control abstraction to drive self-service, self-healing, and self-optimized capabilities in service delivery processes. Nonetheless, the operation complexity of modern network infrastructures make network practitioners apprehensive towards adoption in production, requiring further evidence for correctness. In this paper, we argue that testing, verification and monitoring should become first-class citizens in reference IBN architecture, in order to improve the detection errors during operations. Towards this goal, we present an extension for an intent architecture that allows IBN system to validate the correctness of network configuration using realistic network emulation. Furthermore, we present an intent use-case that ensure correct operation in hybrid networks.
{"title":"Improving Intent Correctness with Automated Testing","authors":"P. Alcock, Ben Simms, Will Fantom, Charalampos Rotsos, N. Race","doi":"10.1109/NetSoft54395.2022.9844054","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844054","url":null,"abstract":"Intent-based networking (IBN) systems have become the de-facto control abstraction to drive self-service, self-healing, and self-optimized capabilities in service delivery processes. Nonetheless, the operation complexity of modern network infrastructures make network practitioners apprehensive towards adoption in production, requiring further evidence for correctness. In this paper, we argue that testing, verification and monitoring should become first-class citizens in reference IBN architecture, in order to improve the detection errors during operations. Towards this goal, we present an extension for an intent architecture that allows IBN system to validate the correctness of network configuration using realistic network emulation. Furthermore, we present an intent use-case that ensure correct operation in hybrid networks.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130654940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The orchestration and management of 5G network slicing (NS) requires cross-domain orchestration across 5G radio access network (RAN), 5G core network (CN), and transport network and also coordination of closed loops of each 5G network segment. We propose a resource orchestration and management architecture for end-to-end (E2E) 5G network slices to automate the flexible and high-performance NS’s management and orchestration. Through developing a prototype of the proposed architecture on an experimental 5G network, the effectiveness of our architecture is proven through prominent use cases certified by ETSI ZSM.
{"title":"End-to-end 5G network slice resource management and orchestration architecture","authors":"Hiroki Baba, Shiku Hirai, Takayuki Nakamura, S. Kanemaru, Kensuke Takahashi, Taisuke Omoto, Shinsaku Akiyama, Senri Hirabaru","doi":"10.1109/NetSoft54395.2022.9844088","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844088","url":null,"abstract":"The orchestration and management of 5G network slicing (NS) requires cross-domain orchestration across 5G radio access network (RAN), 5G core network (CN), and transport network and also coordination of closed loops of each 5G network segment. We propose a resource orchestration and management architecture for end-to-end (E2E) 5G network slices to automate the flexible and high-performance NS’s management and orchestration. Through developing a prototype of the proposed architecture on an experimental 5G network, the effectiveness of our architecture is proven through prominent use cases certified by ETSI ZSM.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134027732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}